-
Optimal Local Simulations of a Quantum Singlet
Authors:
David Llamas,
Dmitry Chistikov,
Adrian Kent,
Mike Paterson,
Olga Goulko
Abstract:
Bell's seminal work showed that no local hidden variable (LHV) model can fully reproduce the quantum correlations of a two-qubit singlet state. His argument and later developments by Clauser et al. effectively rely on gaps between the anticorrelations achievable by classical models and quantum theory for projective measurements along randomly chosen axes separated by a fixed angle. However, the si…
▽ More
Bell's seminal work showed that no local hidden variable (LHV) model can fully reproduce the quantum correlations of a two-qubit singlet state. His argument and later developments by Clauser et al. effectively rely on gaps between the anticorrelations achievable by classical models and quantum theory for projective measurements along randomly chosen axes separated by a fixed angle. However, the size of these gaps has to date remained unknown. Here we numerically determine the LHV models maximizing anticorrelations for random axes separated by any fixed angle, by mapping the problem onto ground state configurations of fixed-range spin models. We identify angles where this gap is largest and thus best suited for Bell tests. These findings enrich the understanding of Bell non-locality as a physical resource in quantum information theory and quantum cryptography.
△ Less
Submitted 29 April, 2025;
originally announced April 2025.
-
A Classification Benchmark for Artificial Intelligence Detection of Laryngeal Cancer from Patient Voice
Authors:
Mary Paterson,
James Moor,
Luisa Cutillo
Abstract:
Cases of laryngeal cancer are predicted to rise significantly in the coming years. Current diagnostic pathways are inefficient, putting undue stress on both patients and the medical system. Artificial intelligence offers a promising solution by enabling non-invasive detection of laryngeal cancer from patient voice, which could help prioritise referrals more effectively. A major barrier in this fie…
▽ More
Cases of laryngeal cancer are predicted to rise significantly in the coming years. Current diagnostic pathways are inefficient, putting undue stress on both patients and the medical system. Artificial intelligence offers a promising solution by enabling non-invasive detection of laryngeal cancer from patient voice, which could help prioritise referrals more effectively. A major barrier in this field is the lack of reproducible methods. Our work addresses this challenge by introducing a benchmark suite comprising 36 models trained and evaluated on open-source datasets. These models classify patients with benign and malignant voice pathologies. All models are accessible in a public repository, providing a foundation for future research. We evaluate three algorithms and three audio feature sets, including both audio-only inputs and multimodal inputs incorporating demographic and symptom data. Our best model achieves a balanced accuracy of 83.7%, sensitivity of 84.0%, specificity of 83.3%, and AUROC of 91.8%.
△ Less
Submitted 13 May, 2025; v1 submitted 20 December, 2024;
originally announced December 2024.
-
Near-factorizations of dihedral groups
Authors:
Donald L. Kreher,
Maura B. Paterson,
Douglas R. Stinson
Abstract:
We investigate near-factorizations of nonabelian groups, concentrating on dihedral groups. We show that some known constructions of near-factorizations in dihedral groups yield equivalent near-factorizations. In fact, there are very few known examples of nonequivalent near-factorizations in dihedral or other nonabelian groups; we provide some new examples with the aid of the computer. We also anal…
▽ More
We investigate near-factorizations of nonabelian groups, concentrating on dihedral groups. We show that some known constructions of near-factorizations in dihedral groups yield equivalent near-factorizations. In fact, there are very few known examples of nonequivalent near-factorizations in dihedral or other nonabelian groups; we provide some new examples with the aid of the computer. We also analyse a construction for near-factorizations in dihedral groups from near-factorizations in cyclic groups, due to Pêcher, and we investigate when nonequivalent near-factorizations can be obtained by this method.
△ Less
Submitted 28 January, 2025; v1 submitted 24 November, 2024;
originally announced November 2024.
-
Daniel Litt's Probability Puzzle
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
In this expository note, we discuss a ``balls-and-urns'' probability puzzle posed by Daniel Litt.
In this expository note, we discuss a ``balls-and-urns'' probability puzzle posed by Daniel Litt.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
Beyond uniform cyclotomy
Authors:
Sophie Huczynska,
Laura Johnson,
Maura B. Paterson
Abstract:
Cyclotomy, the study of cyclotomic classes and cyclotomic numbers, is an area of number theory first studied by Gauss. It has natural applications in discrete mathematics and information theory. Despite this long history, there are significant limitations to what is known explicitly about cyclotomic numbers, which limits the use of cyclotomy in applications. The main explicit tool available is tha…
▽ More
Cyclotomy, the study of cyclotomic classes and cyclotomic numbers, is an area of number theory first studied by Gauss. It has natural applications in discrete mathematics and information theory. Despite this long history, there are significant limitations to what is known explicitly about cyclotomic numbers, which limits the use of cyclotomy in applications. The main explicit tool available is that of uniform cyclotomy, introduced by Baumert, Mills and Ward in 1982. In this paper, we present an extension of uniform cyclotomy which gives a direct method for evaluating all cyclotomic numbers over $GF(q^n)$ of order dividing $(q^n-1)/(q-1)$, for any prime power $q$ and $n \geq 2$, which does not use character theory nor direct calculation in the field. This allows the straightforward evaluation of many cyclotomic numbers for which other methods are unknown or impractical. Our methods exploit connections between cyclotomy, Singer difference sets and finite geometry.
△ Less
Submitted 24 February, 2025; v1 submitted 24 June, 2024;
originally announced June 2024.
-
Strong External Difference Families and Classification of $α$-valuations
Authors:
Donald L. Kreher,
Maura B. Paterson,
Douglas R. Stinson
Abstract:
One method of constructing $(a^2+1, 2,a, 1)$-SEDFs (i.e., strong external difference families) in $\mathbb{Z}_{a^2+1}$ makes use of $α$-valuations of complete bipartite graphs $K_{a,a}$. We explore this approach and we provide a classification theorem which shows that all such $α$-valuations can be constructed recursively via a sequence of ``blow-up'' operations. We also enumerate all…
▽ More
One method of constructing $(a^2+1, 2,a, 1)$-SEDFs (i.e., strong external difference families) in $\mathbb{Z}_{a^2+1}$ makes use of $α$-valuations of complete bipartite graphs $K_{a,a}$. We explore this approach and we provide a classification theorem which shows that all such $α$-valuations can be constructed recursively via a sequence of ``blow-up'' operations. We also enumerate all $(a^2+1, 2,a, 1)$-SEDFs in $\mathbb{Z}_{a^2+1}$ for $a \leq 14$ and we show that all these SEDFs are equivalent to $α$-valuations via affine transformations. Whether this holds for all $a > 14$ as well is an interesting open problem. We also study SEDFs in dihedral groups, where we show that two known constructions are equivalent.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Using a multistate Mapping Approach to Surface Hopping to predict the Ultrafast Electron Diffraction signal of gas-phase cyclobutanone
Authors:
Lewis Hutton,
Andres Moreno Carrascosa,
Andrew W. Prentice,
Mats Simmermacher,
Johan E. Runeson,
Martin J. Paterson,
Adam Kirrander
Abstract:
Using the recently developed multistate mapping approach to surface hopping (multistate MASH) method combined with SA(3)-CASSCF(12,12)/aug-cc-pVDZ electronic structure calculations, the gas-phase isotropic ultrafast electron diffraction (UED) of cyclobutanone is predicted and analyzed. After excitation into the n-3s Rydberg state (S$_2$), cyclobutanone can relax through two S$_2$/S$_1$ conical int…
▽ More
Using the recently developed multistate mapping approach to surface hopping (multistate MASH) method combined with SA(3)-CASSCF(12,12)/aug-cc-pVDZ electronic structure calculations, the gas-phase isotropic ultrafast electron diffraction (UED) of cyclobutanone is predicted and analyzed. After excitation into the n-3s Rydberg state (S$_2$), cyclobutanone can relax through two S$_2$/S$_1$ conical intersections, one characterized by compression of the \ce{CO} bond, the other by dissociation of the $\mathrmα$-CC bond. Subsequent transfer into the ground state (S$_0$) is then achieved via two additional S$_1$/S$_0$ conical intersections that lead to three reaction pathways: $\mathrmα$ ring-opening, ethene/ketene production, and \ce{CO} liberation. The isotropic gas-phase UED signal is predicted from the multistate MASH simulations, allowing for a direct comparison to experimental data. This work, which is a contribution to the cyclobutanone prediction challenge, facilitates the identification of the main photoproducts in the UED signal and thereby emphasizes the importance of dynamics simulations for the interpretation of ultrafast experiments.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Circular external difference families, graceful labellings and cyclotomy
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
(Strong) circular external difference families (which we denote as CEDFs and SCEDFs) can be used to construct nonmalleable threshold schemes. They are a variation of (strong) external difference families, which have been extensively studied in recent years. We provide a variety of constructions for CEDFs based on graceful labellings ($α$-valuations) of lexicographic products…
▽ More
(Strong) circular external difference families (which we denote as CEDFs and SCEDFs) can be used to construct nonmalleable threshold schemes. They are a variation of (strong) external difference families, which have been extensively studied in recent years. We provide a variety of constructions for CEDFs based on graceful labellings ($α$-valuations) of lexicographic products $C_n \boldsymbol{\cdot} K_{\ell}^c$, where $C_n$ denotes a cycle of length $n$. SCEDFs having more than two subsets do not exist. However, we can construct close approximations (more specifically, certain types of circular algebraic manipulation detection (AMD) codes) using the theory of cyclotomic numbers in finite fields.
△ Less
Submitted 27 October, 2023; v1 submitted 4 October, 2023;
originally announced October 2023.
-
Detecting Throat Cancer from Speech Signals using Machine Learning: A Scoping Literature Review
Authors:
Mary Paterson,
James Moor,
Luisa Cutillo
Abstract:
Introduction: Cases of throat cancer are rising worldwide. With survival decreasing significantly at later stages, early detection is vital. Artificial intelligence (AI) and machine learning (ML) have the potential to detect throat cancer from patient speech, facilitating earlier diagnosis and reducing the burden on overstretched healthcare systems. However, no comprehensive review has explored th…
▽ More
Introduction: Cases of throat cancer are rising worldwide. With survival decreasing significantly at later stages, early detection is vital. Artificial intelligence (AI) and machine learning (ML) have the potential to detect throat cancer from patient speech, facilitating earlier diagnosis and reducing the burden on overstretched healthcare systems. However, no comprehensive review has explored the use of AI and ML for detecting throat cancer from speech. This review aims to fill this gap by evaluating how these technologies perform and identifying issues that need to be addressed in future research. Materials and Methods: We conducted a scoping literature review across three databases: Scopus, Web of Science, and PubMed. We included articles that classified speech using machine learning and specified the inclusion of throat cancer patients in their data. Articles were categorized based on whether they performed binary or multi-class classification. Results: We found 27 articles fitting our inclusion criteria, 12 performing binary classification, 13 performing multi-class classification, and two that do both binary and multiclass classification. The most common classification method used was neural networks, and the most frequently extracted feature was mel-spectrograms. We also documented pre-processing methods and classifier performance. We compared each article against the TRIPOD-AI checklist, which showed a significant lack of open science, with only one article sharing code and only three using open-access data. Conclusion: Open-source code is essential for external validation and further development in this field. Our review indicates that no single method or specific feature consistently outperforms others in detecting throat cancer from speech. Future research should focus on standardizing methodologies and improving the reproducibility of results.
△ Less
Submitted 20 December, 2024; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authenticati…
▽ More
A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authentication code. We show that all group-generated authentication codes have perfect secrecy, which allows us to demonstrate that algebraic manipulation detection codes can be considered to be a special case of an authentication code with perfect secrecy.
We also investigate splitting BIBDs that can be "equitably ordered". These splitting BIBDs yield authentication codes with splitting that also have perfect secrecy. We show that, while group generated BIBDs are inherently equitably ordered, the concept is applicable to more general splitting BIBDs. For various pairs $(k,c)$, we determine necessary and sufficient (or almost sufficient) conditions for the existence of $(v, k \times c,1)$-splitting BIBDs that can be equitably ordered. The pairs for which we can solve this problem are $(k,c) = (3,2), (4,2), (3,3)$ and $(3,4)$, as well as all cases with $k = 2$.
△ Less
Submitted 24 August, 2021; v1 submitted 22 April, 2021;
originally announced April 2021.
-
More about Exact Slow $k$-Nim
Authors:
Nikolay Chikin,
Vladimir Gurvich,
Konstantin Knop,
Mike Paterson,
Michael Vyalyi
Abstract:
Given $n$ piles of tokens and a positive integer $k \leq n$, the game Nim$^1_{n, =k}$ of exact slow $k$-Nim is played as follows. Two players move alternately. In each move, a player chooses exactly $k$ non-empty piles and removes one token from each of them. A player whose turn it is to move but has no move loses (if the normal version of the game is played, and wins if it is the misére version).…
▽ More
Given $n$ piles of tokens and a positive integer $k \leq n$, the game Nim$^1_{n, =k}$ of exact slow $k$-Nim is played as follows. Two players move alternately. In each move, a player chooses exactly $k$ non-empty piles and removes one token from each of them. A player whose turn it is to move but has no move loses (if the normal version of the game is played, and wins if it is the misére version). In Integers 20 (2020) 1-19, Gurvich et al gave an explicit formula for the Sprague-Grundy function of Nim$^1_{4, =2}$, for both its normal and misére version. Here we extend this result and obtain an explicit formula for the P-positions of the normal version of Nim$^1_{5, =2}$ and Nim$^1_{6, =2}$.
△ Less
Submitted 6 February, 2021;
originally announced February 2021.
-
Haystack Hunting Hints and Locker Room Communication
Authors:
Artur Czumaj,
George Kontogeorgiou,
Mike Paterson
Abstract:
We want to efficiently find a specific object in a large unstructured set, which we model by a random $n$-permutation, and we have to do it by revealing just a single element. Clearly, without any help this task is hopeless and the best one can do is select the element at random, and achieve the success probability $\frac{1}{n}$. Can we do better with some small amount of advice about the permutat…
▽ More
We want to efficiently find a specific object in a large unstructured set, which we model by a random $n$-permutation, and we have to do it by revealing just a single element. Clearly, without any help this task is hopeless and the best one can do is select the element at random, and achieve the success probability $\frac{1}{n}$. Can we do better with some small amount of advice about the permutation, even without knowing the object sought? We show that by providing advice of just one integer in $\{0,1,...,n-1\}$, one can improve the success probability considerably, by a $Θ(\frac{logn}{loglogn})$ factor. We study this and related problems, and show asymptotically matching upper and lower bounds for their optimal probability of success.Our analysis relies on a close relationship of such problems to some intrinsic properties of rendom permutations related to the rencontres number.
△ Less
Submitted 3 June, 2021; v1 submitted 26 August, 2020;
originally announced August 2020.
-
Globe-hopping
Authors:
Dmitry Chistikov,
Olga Goulko,
Adrian Kent,
Mike Paterson
Abstract:
We consider versions of the grasshopper problem (Goulko and Kent, 2017) on the circle and the sphere, which are relevant to Bell inequalities. For a circle of circumference $2π$, we show that for unconstrained lawns of any length and arbitrary jump lengths, the supremum of the probability for the grasshopper's jump to stay on the lawn is one. For antipodal lawns, which by definition contain precis…
▽ More
We consider versions of the grasshopper problem (Goulko and Kent, 2017) on the circle and the sphere, which are relevant to Bell inequalities. For a circle of circumference $2π$, we show that for unconstrained lawns of any length and arbitrary jump lengths, the supremum of the probability for the grasshopper's jump to stay on the lawn is one. For antipodal lawns, which by definition contain precisely one of each pair of opposite points and have length $π$, we show this is true except when the jump length $φ$ is of the form $π\frac{p}{q}$ with $p,q$ coprime and $p$ odd. For these jump lengths we show the optimal probability is $1 - 1/q$ and construct optimal lawns. For a pair of antipodal lawns, we show that the optimal probability of jumping from one onto the other is $1 - 1/q$ for $p,q$ coprime, $p$ odd and $q$ even, and one in all other cases. For an antipodal lawn on the sphere, it is known (Kent and Pitalúa-García, 2014) that if $φ= π/q$, where $q \in \mathbb N$, then the optimal retention probability of $1-1/q$ for the grasshopper's jump is provided by a hemispherical lawn. We show that in all other cases where $0<φ< π/2$, hemispherical lawns are not optimal, disproving the hemispherical colouring maximality hypotheses (Kent and Pitalúa-García, 2014). We discuss the implications for Bell experiments and related cryptographic tests.
△ Less
Submitted 17 January, 2020;
originally announced January 2020.
-
Convergence of Opinion Diffusion is PSPACE-complete
Authors:
Dmitry Chistikov,
Grzegorz Lisowski,
Mike Paterson,
Paolo Turrini
Abstract:
We analyse opinion diffusion in social networks, where a finite set of individuals is connected in a directed graph and each simultaneously changes their opinion to that of the majority of their influencers. We study the algorithmic properties of the fixed-point behaviour of such networks, showing that the problem of establishing whether individuals converge to stable opinions is PSPACE-complete.
We analyse opinion diffusion in social networks, where a finite set of individuals is connected in a directed graph and each simultaneously changes their opinion to that of the majority of their influencers. We study the algorithmic properties of the fixed-point behaviour of such networks, showing that the problem of establishing whether individuals converge to stable opinions is PSPACE-complete.
△ Less
Submitted 30 March, 2020; v1 submitted 20 December, 2019;
originally announced December 2019.
-
On the equivalence of authentication codes and robust (2,2)-threshold schemes
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
In this paper, we show a "direct" equivalence between certain authentication codes and robust secret sharing schemes. It was previously known that authentication codes and robust secret sharing schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution att…
▽ More
In this paper, we show a "direct" equivalence between certain authentication codes and robust secret sharing schemes. It was previously known that authentication codes and robust secret sharing schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution attack." We study this attack and analyze it in the setting of "dual authentication codes." We also show how this viewpoint provides a nice way to prove properties and generalizations of some known constructions.
△ Less
Submitted 12 October, 2019;
originally announced October 2019.
-
Deploying the NASA Valkyrie Humanoid for IED Response: An Initial Approach and Evaluation Summary
Authors:
Steven Jens Jorgensen,
Michael W. Lanighan,
Sylvain S. Bertrand,
Andrew Watson,
Joseph S. Altemus,
R. Scott Askew,
Lyndon Bridgwater,
Beau Domingue,
Charlie Kendrick,
Jason Lee,
Mark Paterson,
Jairo Sanchez,
Patrick Beeson,
Seth Gee,
Stephen Hart,
Ana Huaman Quispe,
Robert Griffin,
Inho Lee,
Stephen McCrory,
Luis Sentis,
Jerry Pratt,
Joshua S. Mehling
Abstract:
As part of a feasibility study, this paper shows the NASA Valkyrie humanoid robot performing an end-to-end improvised explosive device (IED) response task. To demonstrate and evaluate robot capabilities, sub-tasks highlight different locomotion, manipulation, and perception requirements: traversing uneven terrain, passing through a narrow passageway, opening a car door, retrieving a suspected IED,…
▽ More
As part of a feasibility study, this paper shows the NASA Valkyrie humanoid robot performing an end-to-end improvised explosive device (IED) response task. To demonstrate and evaluate robot capabilities, sub-tasks highlight different locomotion, manipulation, and perception requirements: traversing uneven terrain, passing through a narrow passageway, opening a car door, retrieving a suspected IED, and securing the IED in a total containment vessel (TCV). For each sub-task, a description of the technical approach and the hidden challenges that were overcome during development are presented. The discussion of results, which explicitly includes existing limitations, is aimed at motivating continued research and development to enable practical deployment of humanoid robots for IED response. For instance, the data shows that operator pauses contribute to 50\% of the total completion time, which implies that further work is needed on user interfaces for increasing task completion efficiency.
△ Less
Submitted 1 October, 2019;
originally announced October 2019.
-
Characterising bimodal collections of sets in finite groups
Authors:
Sophie Huczynska,
Maura B. Paterson
Abstract:
A collection of disjoint subsets ${\cal A}=\{A_1,A_2,\dotsc,A_m\}$ of a finite abelian group is said to have the \emph{bimodal} property if, for any non-zero group element $δ$, either $δ$ never occurs as a difference between an element of $A_i$ and an element of some other set $A_j$, or else for every element $a_i$ in $A_i$ there is an element $a_j\in A_j$ for some $j\neq i$ such that $a_i-a_j=δ$.…
▽ More
A collection of disjoint subsets ${\cal A}=\{A_1,A_2,\dotsc,A_m\}$ of a finite abelian group is said to have the \emph{bimodal} property if, for any non-zero group element $δ$, either $δ$ never occurs as a difference between an element of $A_i$ and an element of some other set $A_j$, or else for every element $a_i$ in $A_i$ there is an element $a_j\in A_j$ for some $j\neq i$ such that $a_i-a_j=δ$. This property arises in various familiar situations, such as the cosets of a fixed subgroup or in a group partition, and has applications to the construction of optimal algebraic manipulation detection (AMD) codes. In this paper, we obtain a structural characterisation for bimodal collections of sets.
△ Less
Submitted 27 March, 2019;
originally announced March 2019.
-
Federating distributed storage for clouds in ATLAS
Authors:
Frank Berghaus,
Kevin Casteels,
Alessandro Di Girolamo,
Colson Driemel,
Marcus Ebert,
Fabrizio Furano,
Fernado Galindo,
Mario Lassnig,
Colin Leavett-Brown,
Michael Paterson,
Cedric Serfon,
Rolf Seuster,
Randall Sobie,
Reda Tafirout,
Ryan Paul Taylor
Abstract:
Input data for applications that run in cloud computing centres can be stored at distant repositories, often with multiple copies of the popular data stored at many sites. Locating and retrieving the remote data can be challenging, and we believe that federating the storage can address this problem. A federation would locate the closest copy of the data on the basis of GeoIP information. Currently…
▽ More
Input data for applications that run in cloud computing centres can be stored at distant repositories, often with multiple copies of the popular data stored at many sites. Locating and retrieving the remote data can be challenging, and we believe that federating the storage can address this problem. A federation would locate the closest copy of the data on the basis of GeoIP information. Currently we are using the dynamic data federation Dynafed, a software solution developed by CERN IT. Dynafed supports several industry standards for connection protocols like Amazon's S3, Microsoft's Azure, as well as WebDAV and HTTP. Dynafed functions as an abstraction layer under which protocol-dependent authentication details are hidden from the user, requiring the user to only provide an X509 certificate. We have setup an instance of Dynafed and integrated it into the ATLAS data distribution management system. We report on the challenges faced during the installation and integration. We have tested ATLAS analysis jobs submitted by the PanDA production system and we report on our first experiences with its operation.
△ Less
Submitted 26 October, 2018;
originally announced October 2018.
-
Functional repair codes: a view from projective geometry
Authors:
Siaw-Lynn Ng,
Maura B. Paterson
Abstract:
Storage codes are used to ensure reliable storage of data in distributed systems. Here we consider functional repair codes, where individual storage nodes that fail may be repaired efficiently and the ability to recover original data and to further repair failed nodes is preserved. There are two predominant approaches to repair codes: a coding theoretic approach and a vector space approach. We exp…
▽ More
Storage codes are used to ensure reliable storage of data in distributed systems. Here we consider functional repair codes, where individual storage nodes that fail may be repaired efficiently and the ability to recover original data and to further repair failed nodes is preserved. There are two predominant approaches to repair codes: a coding theoretic approach and a vector space approach. We explore the relationship between the two and frame the later in terms of projective geometry. We find that many of the constructions proposed in the literature can be seen to arise from natural and well-studied geometric objects, and that this perspective gives a framework that provides opportunities for generalisations and new constructions that can lead to greater flexibility in trade-offs between various desirable properties. We also frame the cut-set bound obtained from network coding in terms of projective geometry. We explore the notion of strictly functional repair codes, for which there exist nodes that cannot be replaced exactly. Currently only one known example is given in the literature, due to Hollmann and Poh. We examine this phenomenon from a projective geometry point of view, and discuss how strict functionality can arise. Finally, we consider the issue that the view of a repair code as a collection of sets of vector/projective subspaces is recursive in nature and makes it hard to visualise what a collection of nodes looks like and how one might approach a construction. Here we provide another view of using directed graphs that gives us non-recursive criteria for determining whether a family of collections of subspaces constitutes a function, exact, or strictly functional repair code, which may be of use in searching for new codes with desirable properties.
△ Less
Submitted 21 September, 2018;
originally announced September 2018.
-
An Advanced NCRF Linac Concept for a High Energy e$^+$e$^-$ Linear Collider
Authors:
Karl L. Bane,
Timothy L. Barklow,
Martin Breidenbach,
Craig P. Burkhart,
Eric A. Fauve,
Alysson R. Gold,
Vincent Heloin,
Zenghai Li,
Emilio A. Nanni,
Mamdouh Nasr,
Marco Oriunno,
James McEwan Paterson,
Michael E. Peskin,
Tor O. Raubenheimer,
Sami G. Tantawi
Abstract:
We have explored a concept for an advanced Normal-Conducting Radio-Frequency (NCRF) C-band linear accelerator (linac) structure to achieve a high gradient, high power e$^+$e$^-$ linear collider in the TeV class. This design study represents the first comprehensive investigation for an emerging class of distributed coupling accelerator topology exploring nominal cavity geometries, frequency and tem…
▽ More
We have explored a concept for an advanced Normal-Conducting Radio-Frequency (NCRF) C-band linear accelerator (linac) structure to achieve a high gradient, high power e$^+$e$^-$ linear collider in the TeV class. This design study represents the first comprehensive investigation for an emerging class of distributed coupling accelerator topology exploring nominal cavity geometries, frequency and temperature of operation. The structure features internal manifolds for distributing RF power separately to each cell, permitting the full structure geometry to be designed for high shunt impedance and low breakdown. Optimized within operational constraints, we find that it is advantageous for the structure to be cooled directly by liquid nitrogen (LN), further increasing the shunt impedance. A crucial part of this design process has been cost optimization, which is largely driven by the cost of peak RF power. The first operation of a distributed coupling structure at cryogenic temperatures and the nominal operating gradient 120 MeV/m is also presented, demonstrating the feasibility of achieving high-gradient performance with a cryogenically-cooled normal-conducting accelerating structure.
△ Less
Submitted 7 April, 2019; v1 submitted 26 July, 2018;
originally announced July 2018.
-
Weighted external difference families and R-optimal AMD codes
Authors:
Sophie Huczynska,
Maura B. Paterson
Abstract:
In this paper, we provide a mathematical framework for characterizing AMD codes that are R-optimal. We introduce a new combinatorial object, the reciprocally-weighted external difference family (RWEDF), which corresponds precisely to an R-optimal weak AMD code. This definition subsumes known examples of existing optimal codes, and also encompasses combinatorial objects not covered by previous defi…
▽ More
In this paper, we provide a mathematical framework for characterizing AMD codes that are R-optimal. We introduce a new combinatorial object, the reciprocally-weighted external difference family (RWEDF), which corresponds precisely to an R-optimal weak AMD code. This definition subsumes known examples of existing optimal codes, and also encompasses combinatorial objects not covered by previous definitions in the literature. By developing structural group-theoretic characterizations, we exhibit infinite families of new RWEDFs, and new construction methods for known objects such as near-complete EDFs. Examples of RWEDFs in non-abelian groups are also discussed.
△ Less
Submitted 3 May, 2018;
originally announced May 2018.
-
Lower bound for monotone Boolean convolution
Authors:
Mike S. Paterson
Abstract:
Any monotone Boolean circuit computing the $n$-dimensional Boolean convolution requires at least $n^2$ and-gates. This precisely matches the obvious upper bound.
Any monotone Boolean circuit computing the $n$-dimensional Boolean convolution requires at least $n^2$ and-gates. This precisely matches the obvious upper bound.
△ Less
Submitted 20 January, 2020; v1 submitted 11 August, 2017;
originally announced August 2017.
-
Maximizing the area of intersection of rectangles
Authors:
David B. A. Epstein,
Mike Paterson
Abstract:
This paper attacks the following problem. We are given a large number $N$ of rectangles in the plane, each with horizontal and vertical sides, and also a number $r<N$. The given list of $N$ rectangles may contain duplicates. The problem is to find $r$ of these rectangles, such that, if they are discarded, then the intersection of the remaining $(N-r)$ rectangles has an intersection with as large a…
▽ More
This paper attacks the following problem. We are given a large number $N$ of rectangles in the plane, each with horizontal and vertical sides, and also a number $r<N$. The given list of $N$ rectangles may contain duplicates. The problem is to find $r$ of these rectangles, such that, if they are discarded, then the intersection of the remaining $(N-r)$ rectangles has an intersection with as large an area as possible. We will find an upper bound, depending only on $N$ and $r$, and not on the particular data presented, for the number of steps needed to run the algorithm on (a mathematical model of) a computer. In fact our algorithm is able to determine, for each $s\le r$, $s$ rectangles from the given list of $N$ rectangles, such that the remaining $(N-s)$ rectangles have as large an area as possible, and this takes hardly any more time than taking care only of the case $s=r$. Our algorithm extends to $d$-dimensional rectangles. Our method is to exhaustively examine all possible intersections---this is much faster than it sounds, because we do not need to examine all $\binom Ns$ subsets in order to find all possible intersection rectangles. For an extreme example, suppose the rectangles are nested, for example concentric squares of distinct sizes, then the only intersections examined are the smallest $s+1$ rectangles.
△ Less
Submitted 25 March, 2017;
originally announced March 2017.
-
Existence and Non-Existence Results for Strong External Difference Families
Authors:
Sophie Huczynska,
Maura B. Paterson
Abstract:
We consider strong external difference families (SEDFs); these are external difference families satisfying additional conditions on the patterns of external diferences that occur, and were first defined in the context of classifying optimal strong algebraic manipulation detection codes. We establish new necessary conditions for the existence of (n; m; k; lambda)-SEDFs; in particular giving a near-…
▽ More
We consider strong external difference families (SEDFs); these are external difference families satisfying additional conditions on the patterns of external diferences that occur, and were first defined in the context of classifying optimal strong algebraic manipulation detection codes. We establish new necessary conditions for the existence of (n; m; k; lambda)-SEDFs; in particular giving a near-complete treatment of the lambda = 2 case. For the case m = 2, we obtain a structural characterization for partition type SEDFs (of maximum possible k and lambda), showing that these correspond to Paley partial difference sets. We also prove a version of our main result for generalized SEDFs, establishing non-trivial necessary conditions for their existence.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
PIR schemes with small download complexity and low storage requirements
Authors:
Simon R. Blackburn,
Tuvi Etzion,
Maura B. Paterson
Abstract:
In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there…
▽ More
In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there have been moves to consider more realistic models where the total storage of the set of servers, or the per server storage, should be minimised (possibly using techniques from distributed storage), and where the database is divided into $R$-bit records with $R>1$, and the user wishes to retrieve one record rather than one bit. When $R$ is large, downloads from the servers to the user dominate the communication complexity and so the aim is to minimise the total number of downloaded bits. Shah, Rashmi and Ramchandran show that at least $R+1$ bits must be downloaded from servers in the worst case, and provide PIR schemes meeting this bound. Sun and Jafar determine the best asymptotic download cost of a PIR scheme (as $R\rightarrow\infty$), where this cost is defined as the ratio of the message length $R$ and the total number of bits downloaded.
This paper provides various bounds on the download complexity of a PIR scheme, generalising those of Shah et al. to the case when the number $n$ of servers is bounded, and providing links with classical techniques due to Chor et al. The paper also provides a range of constructions for PIR schemes that are either simpler or perform better than previously known schemes, including explicit schemes that achieve the best asymptotic download complexity of Sun and Jafar with significantly lower upload complexity, and general techniques for constructing a scheme with good worst case download complexity from a scheme with good download complexity on average.
△ Less
Submitted 4 December, 2018; v1 submitted 22 September, 2016;
originally announced September 2016.
-
Multi-prover Proof-of-Retrievability
Authors:
Maura B. Paterson,
Douglas R. Stinson,
Jalaj Upadhyay
Abstract:
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w…
▽ More
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover the file given any "proving algorithm" that has a sufficiently high success probability. This forms the basis of \emph{proof-of-retrievability} ($\mathsf{PoR}$) systems.
In this paper, we study multiple server $\mathsf{PoR}$ systems. We formalize security definitions for two possible scenarios: (i) when a threshold of servers succeed with high enough probability (worst-case) and (ii) when the average of the success probability of all the servers is above a threshold (average-case). We also motivate the study of confidentiality of the outsourced message. We give $\mathsf{M}\mbox{-}\mathsf{PoR}$ schemes which are secure under both these security definitions and provide reasonable confidentiality guarantees even when there is no restriction on the computational power of the servers. We also show how classical statistical techniques used by Paterson, Stinson and Upadhyay (Journal of Mathematical Cryptology: 7(3)) can be extended to evaluate whether the responses of the provers are accurate enough to permit successful extraction. We also look at one specific instantiation of our construction when instantiated with the unconditionally secure version of the Shacham-Waters scheme (Asiacrypt, 2008). This scheme gives reasonable security and privacy guarantee. We show that, in the multi-server setting with computationally unbounded provers, one can overcome the limitation that the verifier needs to store as much secret information as the provers.
△ Less
Submitted 8 March, 2016;
originally announced March 2016.
-
Disjoint difference families and their applications
Authors:
S. -L. Ng,
M. B. Paterson
Abstract:
Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families and the variations in priorities in constructions. We propose a definition of disjoint difference families that encompasses these variations and al…
▽ More
Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families and the variations in priorities in constructions. We propose a definition of disjoint difference families that encompasses these variations and allows a comparison of the similarities and disparities. We then focus on two constructions of disjoint difference families arising from frequency hopping sequences and showed that they are in fact the same. We conclude with a discussion of the notion of equivalence for frequency hopping sequences and for disjoint difference families.
△ Less
Submitted 22 October, 2015; v1 submitted 17 September, 2015;
originally announced September 2015.
-
Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families is…
▽ More
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families is an interesting problem in its own right.
△ Less
Submitted 8 June, 2015;
originally announced June 2015.
-
Multireference X-Ray Emission and Absorption Spectroscopy calculations from Monte Carlo Configuration Interaction
Authors:
J. P. Coe,
M. J. Paterson
Abstract:
We adapt the method of Monte Carlo configuration interaction to calculate core-hole states and use this for the computation of X-ray emission and absorption values. We consider CO, CH$_{4}$, NH$_{3}$, H$_{2}$O, HF, HCN, CH$_{3}$OH, CH$_{3}$F, HCl and NO using a 6-311G** basis. We also look at carbon monoxide with a stretched geometry and discuss the dependence of its results on the cutoff used. Th…
▽ More
We adapt the method of Monte Carlo configuration interaction to calculate core-hole states and use this for the computation of X-ray emission and absorption values. We consider CO, CH$_{4}$, NH$_{3}$, H$_{2}$O, HF, HCN, CH$_{3}$OH, CH$_{3}$F, HCl and NO using a 6-311G** basis. We also look at carbon monoxide with a stretched geometry and discuss the dependence of its results on the cutoff used. The Monte Carlo configuration interaction results are compared with EOM-CCSD values for X-ray emission and with experiment for X-ray absorption. Oscillator strengths are also computed and we quantify the multireference nature of the wavefunctions to suggest when approaches based on a single reference would be expected to be successful.
△ Less
Submitted 6 May, 2015;
originally announced May 2015.
-
Approaching exact hyperpolarizabilities via sum-over-states Monte Carlo configuration interaction
Authors:
J. P. Coe,
M. J. Paterson
Abstract:
We propose using sum-over-states calculations with the compact wavefunctions of Monte Carlo configuration interaction to approach accurate values for higher-order dipole properties up to second hyperpolarizabilities in a controlled way. We apply the approach to small systems that can generally be compared with full configuration interaction (FCI) results. We consider hydrogen fluoride with a 6-31g…
▽ More
We propose using sum-over-states calculations with the compact wavefunctions of Monte Carlo configuration interaction to approach accurate values for higher-order dipole properties up to second hyperpolarizabilities in a controlled way. We apply the approach to small systems that can generally be compared with full configuration interaction (FCI) results. We consider hydrogen fluoride with a 6-31g basis and then look at results, including frequency dependent properties, in an aug-cc-pVDZ basis. We extend one calculation beyond FCI by using an aug-cc-pVTZ basis. The properties of an H$_{4}$ molecule with multireference character are calculated in an aug-cc-pVDZ basis. We then investigate this method on a strongly multireference system with a larger FCI space by modelling the properties of carbon monoxide with a stretched geometry. The behavior of the approach with increasing basis size is considered by calculating results for the neon atom using aug-cc-pVDZ to aug-cc-pVQZ. We finally test if the unusual change in polarizability between the first two states of molecular oxygen can be reproduced by this method in a 6-31g basis.
△ Less
Submitted 25 September, 2014;
originally announced September 2014.
-
Applying Monte Carlo configuration interaction to transition metal dimers: exploring the balance between static and dynamic correlation
Authors:
J. P. Coe,
P. Murphy,
M. J. Paterson
Abstract:
We calculate potential curves for transition metal dimers using Monte Carlo configuration interaction (MCCI). These results, and their associated spectroscopic values, are compared with experimental and computational studies. The multireference nature of the MCCI wavefunction is quantified and we estimate the important orbitals. We initially consider the ground state of the chromium dimer. Next we…
▽ More
We calculate potential curves for transition metal dimers using Monte Carlo configuration interaction (MCCI). These results, and their associated spectroscopic values, are compared with experimental and computational studies. The multireference nature of the MCCI wavefunction is quantified and we estimate the important orbitals. We initially consider the ground state of the chromium dimer. Next we calculate potential curves for Sc$_{2}$ where we contrast the lowest triplet and quintet states. We look at the molybdenum dimer where we compare non-relativistic results with the partial inclusion of relativistic effects via effective core potentials, and report results for scandium nickel.
△ Less
Submitted 22 May, 2014;
originally announced May 2014.
-
Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
We study a method for key predistribution in a network of $n$ users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph $G$ can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of th…
▽ More
We study a method for key predistribution in a network of $n$ users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph $G$ can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of this type to be secure. We also consider the problem of minimizing the storage requirements of such a scheme; we are interested in the total storage as well as the maximum storage required by any user. Minimizing the total storage is NP-hard, whereas minimizing the maximum storage required by a user can be computed in polynomial time.
△ Less
Submitted 6 March, 2014;
originally announced March 2014.
-
Characterizing a configuration interaction excited state using natural transition geminals
Authors:
J. P. Coe,
M. J. Paterson
Abstract:
We introduce natural transition geminals as a means to qualitatively understand a transition where double excitations are important. The first two $A_{1}$ singlet states of the CH cation are used as an initial example. We calculate these states with configuration interaction singles (CIS) and state-averaged Monte Carlo configuration interaction (SA-MCCI). For each method we compare the important n…
▽ More
We introduce natural transition geminals as a means to qualitatively understand a transition where double excitations are important. The first two $A_{1}$ singlet states of the CH cation are used as an initial example. We calculate these states with configuration interaction singles (CIS) and state-averaged Monte Carlo configuration interaction (SA-MCCI). For each method we compare the important natural transition geminals with the dominant natural transition orbitals. We then compare SA-MCCI and full configuration interaction (FCI) with regards to the natural transition geminals using the beryllium atom. We compare using the natural transition geminals with analyzing the important configurations in the CI expansion to give the dominant transition for the beryllium atom and the carbon dimer. Finally we calculate the natural transition geminals for two electronic excitations of formamide.
△ Less
Submitted 28 February, 2014;
originally announced February 2014.
-
State-averaged Monte Carlo configuration interaction applied to electronically excited states
Authors:
J. P. Coe,
M. J. Paterson
Abstract:
We introduce state-averaging into the method of Monte Carlo configuration interaction (SA-MCCI) to allow the stable and efficient calculation of excited states. We show that excited potential curves for H$_{3}$, including a crossing with the ground state, can be accurately reproduced using a small fraction of the FCI space. A recently introduced error measure for potential curves [J. P. Coe and M.…
▽ More
We introduce state-averaging into the method of Monte Carlo configuration interaction (SA-MCCI) to allow the stable and efficient calculation of excited states. We show that excited potential curves for H$_{3}$, including a crossing with the ground state, can be accurately reproduced using a small fraction of the FCI space. A recently introduced error measure for potential curves [J. P. Coe and M. J. Paterson, J. Chem. Phys., 137, 204108 (2012)] is shown to also be a fair approach when considering potential curves for multiple states. We demonstrate that potential curves for LiF using SA-MCCI agree well with the FCI results and the avoided crossing occurs correctly. The seam of conical intersections for CH$_{2}$ found by Yarkony [J. Chem. Phys., 104, 2932 (1996)] is used as a test for SA-MCCI and we compare potential curves from SA-MCCI with FCI results for this system for the first three triplet states. We then demonstrate the improvement from using SA-MCCI on the dipole of the $2$ $^{1}A_{1}$ state of carbon monoxide. We then look at vertical excitations for small organic molecules up to the size of butadiene where the SA-MCCI energies and oscillator strengths are compared with CASPT2 values [M. Schreiber, M. R. Silva-Junior, S. P. A. Sauer, and W. Thiel, J. Chem. Phys., 128, 134110 (2008)]. We finally see if the SA-MCCI results for these excitation energies can be improved by using MCCIPT2 with approximate natural orbitals when the PT2 space is not onerously large.
△ Less
Submitted 28 February, 2014;
originally announced February 2014.
-
False-Name Manipulations in Weighted Voting Games
Authors:
Haris Aziz,
Yoram Bachrach,
Edith Elkind,
Mike Paterson
Abstract:
Weighted voting is a classic model of cooperation among agents in decision-making domains. In such games, each player has a weight, and a coalition of players wins the game if its total weight meets or exceeds a given quota. A players power in such games is usually not directly proportional to his weight, and is measured by a power index, the most prominent among which are the Shapley-Shubik index…
▽ More
Weighted voting is a classic model of cooperation among agents in decision-making domains. In such games, each player has a weight, and a coalition of players wins the game if its total weight meets or exceeds a given quota. A players power in such games is usually not directly proportional to his weight, and is measured by a power index, the most prominent among which are the Shapley-Shubik index and the Banzhaf index.In this paper, we investigate by how much a player can change his power, as measured by the Shapley-Shubik index or the Banzhaf index, by means of a false-name manipulation, i.e., splitting his weight among two or more identities. For both indices, we provide upper and lower bounds on the effect of weight-splitting. We then show that checking whether a beneficial split exists is NP-hard, and discuss efficient algorithms for restricted cases of this problem, as well as randomized algorithms for the general case. We also provide an experimental evaluation of these algorithms. Finally, we examine related forms of manipulative behavior, such as annexation, where a player subsumes other players, or merging, where several players unite into one. We characterize the computational complexity of such manipulations and provide limits on their effects. For the Banzhaf index, we describe a new paradox, which we term the Annexation Non-monotonicity Paradox.
△ Less
Submitted 16 January, 2014;
originally announced January 2014.
-
Dynamic web cache publishing for IaaS clouds using Shoal
Authors:
Ian Gable,
Michael Chester,
Patrick Armstrong,
Frank Berghaus,
Andre Charbonneau,
Colin Leavett-Brown,
Michael Paterson,
Robert Prior,
Randall Sobie,
Ryan Taylor
Abstract:
We have developed a highly scalable application, called Shoal, for tracking and utilizing a distributed set of HTTP web caches. Squid servers advertise their existence to the Shoal server via AMQP messaging by running Shoal Agent. The Shoal server provides a simple REST interface that allows clients to determine their closest Squid cache. Our goal is to dynamically instantiate Squid caches on IaaS…
▽ More
We have developed a highly scalable application, called Shoal, for tracking and utilizing a distributed set of HTTP web caches. Squid servers advertise their existence to the Shoal server via AMQP messaging by running Shoal Agent. The Shoal server provides a simple REST interface that allows clients to determine their closest Squid cache. Our goal is to dynamically instantiate Squid caches on IaaS clouds in response to client demand. Shoal provides the VMs on IaaS clouds with the location of the nearest dynamically instantiated Squid Cache. In this paper, we describe the design and performance of Shoal.
△ Less
Submitted 31 October, 2013;
originally announced November 2013.
-
The International Linear Collider Technical Design Report - Volume 3.I: Accelerator R&D in the Technical Design Phase
Authors:
Chris Adolphsen,
Maura Barone,
Barry Barish,
Karsten Buesser,
Philip Burrows,
John Carwardine,
Jeffrey Clark,
Hélène Mainaud Durand,
Gerry Dugan,
Eckhard Elsen,
Atsushi Enomoto,
Brian Foster,
Shigeki Fukuda,
Wei Gai,
Martin Gastal,
Rongli Geng,
Camille Ginsburg,
Susanna Guiducci,
Mike Harrison,
Hitoshi Hayano,
Keith Kershaw,
Kiyoshi Kubo,
Victor Kuchler,
Benno List,
Wanming Liu
, et al. (19 additional authors not shown)
Abstract:
The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the…
▽ More
The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the Z0 pole. A comprehensive value estimate of the accelerator is give, together with associated uncertainties. It is shown that no significant technical issues remain to be solved. Once a site is selected and the necessary site-dependent engineering is carried out, construction can begin immediately. The TDR also gives baseline documentation for two high-performance detectors that can share the ILC luminosity by being moved into and out of the beam line in a "push-pull" configuration. These detectors, ILD and SiD, are described in detail. They form the basis for a world-class experimental programme that promises to increase significantly our understanding of the fundamental processes that govern the evolution of the Universe.
△ Less
Submitted 26 June, 2013;
originally announced June 2013.
-
The International Linear Collider Technical Design Report - Volume 3.II: Accelerator Baseline Design
Authors:
Chris Adolphsen,
Maura Barone,
Barry Barish,
Karsten Buesser,
Philip Burrows,
John Carwardine,
Jeffrey Clark,
Hélène Mainaud Durand,
Gerry Dugan,
Eckhard Elsen,
Atsushi Enomoto,
Brian Foster,
Shigeki Fukuda,
Wei Gai,
Martin Gastal,
Rongli Geng,
Camille Ginsburg,
Susanna Guiducci,
Mike Harrison,
Hitoshi Hayano,
Keith Kershaw,
Kiyoshi Kubo,
Victor Kuchler,
Benno List,
Wanming Liu
, et al. (19 additional authors not shown)
Abstract:
The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the…
▽ More
The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the Z0 pole. A comprehensive value estimate of the accelerator is give, together with associated uncertainties. It is shown that no significant technical issues remain to be solved. Once a site is selected and the necessary site-dependent engineering is carried out, construction can begin immediately. The TDR also gives baseline documentation for two high-performance detectors that can share the ILC luminosity by being moved into and out of the beam line in a "push-pull" configuration. These detectors, ILD and SiD, are described in detail. They form the basis for a world-class experimental programme that promises to increase significantly our understanding of the fundamental processes that govern the evolution of the Universe.
△ Less
Submitted 26 June, 2013;
originally announced June 2013.
-
The International Linear Collider Technical Design Report - Volume 1: Executive Summary
Authors:
Ties Behnke,
James E. Brau,
Brian Foster,
Juan Fuster,
Mike Harrison,
James McEwan Paterson,
Michael Peskin,
Marcel Stanitzki,
Nicholas Walker,
Hitoshi Yamamoto
Abstract:
The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the…
▽ More
The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the Z0 pole. A comprehensive value estimate of the accelerator is give, together with associated uncertainties. It is shown that no significant technical issues remain to be solved. Once a site is selected and the necessary site-dependent engineering is carried out, construction can begin immediately. The TDR also gives baseline documentation for two high-performance detectors that can share the ILC luminosity by being moved into and out of the beam line in a "push-pull" configuration. These detectors, ILD and SiD, are described in detail. They form the basis for a world-class experimental programme that promises to increase significantly our understanding of the fundamental processes that govern the evolution of the Universe.
△ Less
Submitted 26 June, 2013;
originally announced June 2013.
-
Development of Monte Carlo configuration interaction: Natural orbitals and second-order perturbation theory
Authors:
J. P. Coe,
M. J. Paterson
Abstract:
Approximate natural orbitals are investigated as a way to improve a Monte Carlo configuration interaction (MCCI) calculation. We introduce a way to approximate the natural orbitals in MCCI and test these and approximate natural orbitals from MP2 and QCISD in MCCI calculations of single-point energies. The efficiency and accuracy of approximate natural orbitals in MCCI potential curve calculations…
▽ More
Approximate natural orbitals are investigated as a way to improve a Monte Carlo configuration interaction (MCCI) calculation. We introduce a way to approximate the natural orbitals in MCCI and test these and approximate natural orbitals from MP2 and QCISD in MCCI calculations of single-point energies. The efficiency and accuracy of approximate natural orbitals in MCCI potential curve calculations for the double hydrogen dissociation of water, the dissociation of carbon monoxide and the dissociation of the nitrogen molecule are then considered in comparison with standard MCCI when using full configuration interaction as a benchmark. We also use the method to produce a potential curve for water in an aug-cc-pVTZ basis. A new way to quantify the accuracy of a potential curve is put forward that takes into account all of the points and that the curve can be shifted by a constant. We adapt a second-order perturbation scheme to work with MCCI (MCCIPT2) and improve the efficiency of the removal of duplicate states in the method. MCCIPT2 is tested in the calculation of a potential curve for the dissociation of nitrogen using both Slater determinants and configuration state functions.
△ Less
Submitted 11 April, 2013;
originally announced April 2013.
-
HTC Scientific Computing in a Distributed Cloud Environment
Authors:
R. Sobie,
A. Agarwal,
I. Gable,
C. Leavett-Brown,
M. Paterson,
R. Taylor,
A. Charbonneau,
R. Impey,
W. Podiama
Abstract:
This paper describes the use of a distributed cloud computing system for high-throughput computing (HTC) scientific applications. The distributed cloud computing system is composed of a number of separate Infrastructure-as-a-Service (IaaS) clouds that are utilized in a unified infrastructure. The distributed cloud has been in production-quality operation for two years with approximately 500,000 co…
▽ More
This paper describes the use of a distributed cloud computing system for high-throughput computing (HTC) scientific applications. The distributed cloud computing system is composed of a number of separate Infrastructure-as-a-Service (IaaS) clouds that are utilized in a unified infrastructure. The distributed cloud has been in production-quality operation for two years with approximately 500,000 completed jobs where a typical workload has 500 simultaneous embarrassingly-parallel jobs that run for approximately 12 hours. We review the design and implementation of the system which is based on pre-existing components and a number of custom components. We discuss the operation of the system, and describe our plans for the expansion to more sites and increased computing capacity.
△ Less
Submitted 7 February, 2013;
originally announced February 2013.
-
Monte Carlo configuration interaction applied to multipole moments, ionisation energies and electron affinities
Authors:
J. P. Coe,
D. J. Taylor,
M. J. Paterson
Abstract:
The method of Monte Carlo configuration interaction (MCCI) [1,2] is applied to the calculation of multipole moments. We look at the ground and excited state dipole moments in carbon monoxide. We then consider the dipole of NO, the quadrupole of the nitrogen molecule and of BH. An octupole of methane is also calculated. We consider experimental geometries and also stretched bonds. We show that thes…
▽ More
The method of Monte Carlo configuration interaction (MCCI) [1,2] is applied to the calculation of multipole moments. We look at the ground and excited state dipole moments in carbon monoxide. We then consider the dipole of NO, the quadrupole of the nitrogen molecule and of BH. An octupole of methane is also calculated. We consider experimental geometries and also stretched bonds. We show that these non-variational quantities may be found to relatively good accuracy when compared with FCI results, yet using only a small fraction of the full configuration interaction space. MCCI results in the aug-cc-pVDZ basis are seen to generally have reasonably good agreement with experiment. We also investigate the performance of MCCI when applied to ionisation energies and electron affinities of atoms in an aug-cc-pVQZ basis. We compare the MCCI results with full configuration-interaction quantum Monte Carlo [3,4] and `exact' non-relativistic results [3,4]. We show that MCCI could be a useful alternative for the calculation of atomic ionisation energies however electron affinities appear much more challenging for MCCI. Due to the small magnitude of the electron affinities their percentage errors can be high, but with regards to absolute errors MCCI performs similarly for ionisation energies and electron affinities.
△ Less
Submitted 21 January, 2013;
originally announced January 2013.
-
Calculations of Potential Energy Surfaces Using Monte Carlo Configuration Interaction
Authors:
J. P. Coe,
D. J. Taylor,
M. J. Paterson
Abstract:
We apply the method of Monte Carlo configuration interaction (MCCI) to calculate ground-state potential energy curves for a range of small molecules and compare the results with full configuration interaction. We show that the MCCI potential energy curve can be calculated to relatively good accuracy, as quantified using the non-parallelity error, using only a very small fraction of the FCI space.…
▽ More
We apply the method of Monte Carlo configuration interaction (MCCI) to calculate ground-state potential energy curves for a range of small molecules and compare the results with full configuration interaction. We show that the MCCI potential energy curve can be calculated to relatively good accuracy, as quantified using the non-parallelity error, using only a very small fraction of the FCI space. In most cases the potential curve is of better accuracy than its constituent single-point energies. We finally test the MCCI program on systems with basis sets beyond full configuration interaction: a lattice of fifty hydrogen atoms and ethylene. The results for ethylene agree fairly well with other computational work while for the lattice of fifty hydrogens we find that the fraction of the full configuration interaction space we were able to consider appears to be too small as, although some qualitative features are reproduced, the potential curve is less accurate.
△ Less
Submitted 11 December, 2012;
originally announced December 2012.
-
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Authors:
Maura B. Paterson,
Douglas R. Stinson,
Jalaj Upadhyay
Abstract:
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w…
▽ More
There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover or retrieve the file given any "proving algorithm" that has a sufficiently high success probability.
This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes.
△ Less
Submitted 29 October, 2012;
originally announced October 2012.
-
Data Intensive High Energy Physics Analysis in a Distributed Cloud
Authors:
R. J. Sobie,
A. Agarwal,
M. Anderson,
P. Armstrong,
K. Fransham,
I. Gable,
D. Harris,
C. Leavett-Brown,
M. Paterson,
D. Penfold-Brown,
M. Vliet,
A. Charbonneau,
R. Impey,
W. Podaima
Abstract:
We show that distributed Infrastructure-as-a-Service (IaaS) compute clouds can be effectively used for the analysis of high energy physics data. We have designed a distributed cloud system that works with any application using large input data sets requiring a high throughput computing environment. The system uses IaaS-enabled science and commercial clusters in Canada and the United States. We des…
▽ More
We show that distributed Infrastructure-as-a-Service (IaaS) compute clouds can be effectively used for the analysis of high energy physics data. We have designed a distributed cloud system that works with any application using large input data sets requiring a high throughput computing environment. The system uses IaaS-enabled science and commercial clusters in Canada and the United States. We describe the process in which a user prepares an analysis virtual machine (VM) and submits batch jobs to a central scheduler. The system boots the user-specific VM on one of the IaaS clouds, runs the jobs and returns the output to the user. The user application accesses a central database for calibration data during the execution of the application. Similarly, the data is located in a central location and streamed by the running application. The system can easily run one hundred simultaneous jobs in an efficient manner and should scale to many hundreds and possibly thousands of user jobs.
△ Less
Submitted 1 January, 2011;
originally announced January 2011.
-
Cloud Scheduler: a resource manager for distributed compute clouds
Authors:
P. Armstrong,
A. Agarwal,
A. Bishop,
A. Charbonneau,
R. Desmarais,
K. Fransham,
N. Hill,
I. Gable,
S. Gaudet,
S. Goliath,
R. Impey,
C. Leavett-Brown,
J. Ouellete,
M. Paterson,
C. Pritchet,
D. Penfold-Brown,
W. Podaima,
D. Schade,
R. J. Sobie
Abstract:
The availability of Infrastructure-as-a-Service (IaaS) computing clouds gives researchers access to a large set of new resources for running complex scientific applications. However, exploiting cloud resources for large numbers of jobs requires significant effort and expertise. In order to make it simple and transparent for researchers to deploy their applications, we have developed a virtual mach…
▽ More
The availability of Infrastructure-as-a-Service (IaaS) computing clouds gives researchers access to a large set of new resources for running complex scientific applications. However, exploiting cloud resources for large numbers of jobs requires significant effort and expertise. In order to make it simple and transparent for researchers to deploy their applications, we have developed a virtual machine resource manager (Cloud Scheduler) for distributed compute clouds. Cloud Scheduler boots and manages the user-customized virtual machines in response to a user's job submission. We describe the motivation and design of the Cloud Scheduler and present results on its use on both science and commercial clouds.
△ Less
Submitted 30 June, 2010;
originally announced July 2010.
-
Yet Another Hat Game
Authors:
Maura B. Paterson,
Douglas R. Stinson
Abstract:
Several different "hat games" have recently received a fair amount of attention. Typically, in a hat game, one or more players are required to correctly guess their hat colour when given some information about other players' hat colours. Some versions of these games have been motivated by research in complexity theory and have ties to well-known research problems in coding theory, and some varia…
▽ More
Several different "hat games" have recently received a fair amount of attention. Typically, in a hat game, one or more players are required to correctly guess their hat colour when given some information about other players' hat colours. Some versions of these games have been motivated by research in complexity theory and have ties to well-known research problems in coding theory, and some variations have led to interesting new research.
In this paper, we review Ebert's Hat Game, which garnered a considerable amount of publicity in the late 90's and early 00's, and the Hats-on-a-line Game. Then we introduce a new hat game which is a "hybrid" of these two games and provide an optimal strategy for playing the new game. The optimal strategy is quite simple, but the proof involves an interesting combinatorial argument.
△ Less
Submitted 21 January, 2010;
originally announced January 2010.
-
Honeycomb arrays
Authors:
Simon R. Blackburn,
Anastasia Panoui,
Maura B. Paterson,
Douglas R. Stinson
Abstract:
A honeycomb array is an analogue of a Costas array in the hexagonal grid; they were first studied by Golomb and Taylor in 1984. A recent result of Blackburn, Etzion, Martin and Paterson has shown that (in contrast to the situation for Costas arrays) there are only finitely many examples of honeycomb arrays, though their bound on the maximal size of a honeycomb array is too large to permit an exh…
▽ More
A honeycomb array is an analogue of a Costas array in the hexagonal grid; they were first studied by Golomb and Taylor in 1984. A recent result of Blackburn, Etzion, Martin and Paterson has shown that (in contrast to the situation for Costas arrays) there are only finitely many examples of honeycomb arrays, though their bound on the maximal size of a honeycomb array is too large to permit an exhaustive search over all possibilities.
The present paper contains a theorem that significantly limits the number of possibilities for a honeycomb array (in particular, the theorem implies that the number of dots in a honeycomb array must be odd). Computer searches for honeycomb arrays are summarised, and two new examples of honeycomb arrays with 15 dots are given.
△ Less
Submitted 12 November, 2009;
originally announced November 2009.
-
Putting Dots in Triangles
Authors:
Simon R. Blackburn,
Maura B. Paterson,
Douglas R. Stinson
Abstract:
Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that
$N(n) = \lfloor \frac{2n+1}{3} \rfloor$.
In this no…
▽ More
Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that
$N(n) = \lfloor \frac{2n+1}{3} \rfloor$.
In this note, we give a new proof of this result using linear programming techniques.
△ Less
Submitted 18 May, 2010; v1 submitted 22 October, 2009;
originally announced October 2009.
-
Wiretapping a hidden network
Authors:
Haris Aziz,
Oded Lachish,
Mike Paterson,
Rahul Savani
Abstract:
We consider the problem of maximizing the probability of hitting a strategically chosen hidden virtual network by placing a wiretap on a single link of a communication network. This can be seen as a two-player win-lose (zero-sum) game that we call the wiretap game. The value of this game is the greatest probability that the wiretapper can secure for hitting the virtual network. The value is show…
▽ More
We consider the problem of maximizing the probability of hitting a strategically chosen hidden virtual network by placing a wiretap on a single link of a communication network. This can be seen as a two-player win-lose (zero-sum) game that we call the wiretap game. The value of this game is the greatest probability that the wiretapper can secure for hitting the virtual network. The value is shown to equal the reciprocal of the strength of the underlying graph.
We efficiently compute a unique partition of the edges of the graph, called the prime-partition, and find the set of pure strategies of the hider that are best responses against every maxmin strategy of the wiretapper. Using these special pure strategies of the hider, which we call omni-connected-spanning-subgraphs, we define a partial order on the elements of the prime-partition. From the partial order, we obtain a linear number of simple two-variable inequalities that define the maxmin-polytope, and a characterization of its extreme points.
Our definition of the partial order allows us to find all equilibrium strategies of the wiretapper that minimize the number of pure best responses of the hider. Among these strategies, we efficiently compute the unique strategy that maximizes the least punishment that the hider incurs for playing a pure strategy that is not a best response. Finally, we show that this unique strategy is the nucleolus of the recently studied simple cooperative spanning connectivity game.
△ Less
Submitted 4 October, 2009; v1 submitted 29 September, 2009;
originally announced September 2009.