Skip to main content

Showing 1–12 of 12 results for author: George, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.15281  [pdf, ps, other

    quant-ph cs.IT

    A Unified Approach to Quantum Contraction and Correlation Coefficients

    Authors: Ian George, Marco Tomamichel

    Abstract: In classical information theory, the maximal correlation coefficient is used to establish strong limits on distributed processing. Through its relation to the $χ^{2}$-contraction coefficient, it also establishes fundamental bounds on sequential processing. Two distinct quantum extensions of the maximal correlation coefficient have been introduced to recover these two scenarios, but they do not rec… ▽ More

    Submitted 21 May, 2025; originally announced May 2025.

    Comments: ~70 pages, 3 figures. Comments welcome!

  2. arXiv:2503.22823  [pdf, other

    quant-ph cs.IT cs.LG

    Quantum Doeblin Coefficients: Interpretations and Applications

    Authors: Ian George, Christoph Hirche, Theshani Nuradha, Mark M. Wilde

    Abstract: In classical information theory, the Doeblin coefficient of a classical channel provides an efficiently computable upper bound on the total-variation contraction coefficient of the channel, leading to what is known as a strong data-processing inequality. Here, we investigate quantum Doeblin coefficients as a generalization of the classical concept. In particular, we define various new quantum Doeb… ▽ More

    Submitted 28 March, 2025; originally announced March 2025.

    Comments: 88 pages, 2 figures

  3. arXiv:2501.18176  [pdf, other

    quant-ph cs.CC cs.CR

    Experimental relativistic zero-knowledge proofs with unconditional security

    Authors: Chen-Xun Weng, Ming-Yang Li, Nai-Rui Xu, Yanglin Hu, Ian George, Jiawei Wu, Shengjun Wu, Hua-Lei Yin, Zeng-Bing Chen

    Abstract: Zero-knowledge proofs (ZKPs) are widely applied in digital economies, such as cryptocurrencies and smart contracts, for establishing trust and ensuring privacy between untrusted parties. However, almost all ZKPs rely on unproven computational assumptions or are vulnerable to quantum adversaries. We propose and experimentally implement an unconditionally secure ZKP for the graph three-coloring prob… ▽ More

    Submitted 30 January, 2025; originally announced January 2025.

    Comments: 24 pages, 8 figures

  4. arXiv:2411.17241  [pdf, ps, other

    cs.IT quant-ph

    Divergence Inequalities with Applications in Ergodic Theory

    Authors: Ian George, Alice Zheng, Akshay Bansal

    Abstract: The data processing inequality is central to information theory and motivates the study of monotonic divergences. However, it is not clear operationally we need to consider all such divergences. We establish a simple method for Pinsker inequalities as well as general bounds in terms of $χ^{2}$-divergences for twice-differentiable $f$-divergences. These tools imply new relations for input-dependent… ▽ More

    Submitted 1 April, 2025; v1 submitted 26 November, 2024; originally announced November 2024.

    Comments: Corrected some typos; added Lemma 67 to close an accidental gap

  5. arXiv:2406.04245  [pdf, ps, other

    quant-ph cs.LG

    Online learning of a panoply of quantum objects

    Authors: Akshay Bansal, Ian George, Soumik Ghosh, Jamie Sikora, Alice Zheng

    Abstract: In many quantum tasks, there is an unknown quantum object that one wishes to learn. An online strategy for this task involves adaptively refining a hypothesis to reproduce such an object or its measurement statistics. A common evaluation metric for such a strategy is its regret, or roughly the accumulated errors in hypothesis statistics. We prove a sublinear regret bound for learning over general… ▽ More

    Submitted 6 October, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

    Comments: 34 pages. Comments welcome; added clarifications and references

  6. arXiv:2403.01926  [pdf, other

    cs.CL

    IndicVoices: Towards building an Inclusive Multilingual Speech Dataset for Indian Languages

    Authors: Tahir Javed, Janki Atul Nawale, Eldho Ittan George, Sakshi Joshi, Kaushal Santosh Bhogale, Deovrat Mehendale, Ishvinder Virender Sethi, Aparna Ananthanarayanan, Hafsah Faquih, Pratiti Palit, Sneha Ravishankar, Saranya Sukumaran, Tripura Panchagnula, Sunjay Murali, Kunal Sharad Gandhi, Ambujavalli R, Manickam K M, C Venkata Vaijayanthi, Krishnan Srinivasa Raghavan Karunganni, Pratyush Kumar, Mitesh M Khapra

    Abstract: We present INDICVOICES, a dataset of natural and spontaneous speech containing a total of 7348 hours of read (9%), extempore (74%) and conversational (17%) audio from 16237 speakers covering 145 Indian districts and 22 languages. Of these 7348 hours, 1639 hours have already been transcribed, with a median of 73 hours per language. Through this paper, we share our journey of capturing the cultural,… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  7. arXiv:2306.13691  [pdf, other

    cs.SD

    Modulation Graphs in Popular Music

    Authors: Jason I. Brown, Ian George

    Abstract: In this paper, graph theory is used to explore the musical notion of tonal modulation, in theory and application. We define (pivot) modulation graphs based on the common scales used in popular music. Properties and parameters of these graphs are discussed. We also investigate modulation graphs for the canon of Lennon-McCartney songs in the works of The Beatles. Our approach may provide composers w… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

    Comments: 17 pages, 6 figures, 6 tables

    MSC Class: 05C90

  8. arXiv:2301.04301  [pdf, ps, other

    quant-ph cs.IT

    One-Shot Distributed Source Simulation: As Quantum as it Can Get

    Authors: Ian George, Min-Hsiu Hsieh, Eric Chitambar

    Abstract: Distributed source simulation is the task where two (or more) parties share some correlated randomness and use local operations and no communication to convert this into some target correlation. Wyner's seminal result showed that asymptotically the rate of uniform shared randomness needed for this task is given by a mutual information induced measure, now referred to as Wyner's common information.… ▽ More

    Submitted 25 January, 2025; v1 submitted 10 January, 2023; originally announced January 2023.

    Comments: Fixed achievability proof so correction term scales properly; strengthens results. Re-structured paper so it is easier to understand

  9. Cone-Restricted Information Theory

    Authors: Ian George, Eric Chitambar

    Abstract: The max-relative entropy and the conditional min-entropy it induces have become central to one-shot information theory. Both may be expressed in terms of a conic program over the positive semidefinite cone. Recently, it was shown that the same conic program altered to be over the separable cone admits an operational interpretation in terms of communicating classical information over a quantum chan… ▽ More

    Submitted 14 October, 2024; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: Updated formatting, terminology, and some of the presentation for clarity. Some typos fixed as well

  10. arXiv:2107.09794  [pdf, other

    cs.IT astro-ph.IM physics.pop-ph

    Limits of Detecting Extraterrestrial Civilizations

    Authors: Ian George, Xinan Chen, Lav R. Varshney

    Abstract: The search for extraterrestrial intelligence (SETI) is a scientific endeavor which struggles with unique issues -- a strong indeterminacy in what data to look for and when to do so. This has led to attempts at finding both fundamental limits of the communication between extraterrestrial intelligence and human civilizations, as well as benchmarks so as to predict what kinds of signals we might most… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: Main Text: 16 pages, 1 Figure. Comments welcome

  11. arXiv:2011.04069  [pdf, ps, other

    cs.IT

    The Twelvefold Way of Non-Sequential Lossless Compression

    Authors: Taha Ameen ur Rahman, Alton S. Barbehenn, Xinan Chen, Hassan Dbouk, James A. Douglas, Yuncong Geng, Ian George, John B. Harvill, Sung Woo Jeon, Kartik K. Kansal, Kiwook Lee, Kelly A. Levick, Bochao Li, Ziyue Li, Yashaswini Murthy, Adarsh Muthuveeru-Subramaniam, S. Yagiz Olmez, Matthew J. Tomei, Tanya Veeravalli, Xuechao Wang, Eric A. Wayman, Fan Wu, Peng Xu, Shen Yan, Heling Zhang , et al. (5 additional authors not shown)

    Abstract: Many information sources are not just sequences of distinguishable symbols but rather have invariances governed by alternative counting paradigms such as permutations, combinations, and partitions. We consider an entire classification of these invariances called the twelvefold way in enumerative combinatorics and develop a method to characterize lossless compression limits. Explicit computations f… ▽ More

    Submitted 20 January, 2021; v1 submitted 8 November, 2020; originally announced November 2020.

    Comments: DCC 2021

  12. arXiv:1410.8713  [pdf

    cs.NI

    Localization in Wireless Sensor Networks: A Survey

    Authors: Jeril Kuriakose, Sandeep Joshi, V. I. George

    Abstract: Localization is widely used in Wireless Sensor Networks (WSNs) to identify the current location of the sensor odes. A WSN consist of thousands of nodes that make the installation of GPS on each sensor node expensive and moreover GPS may not provide exact localization results in an indoor environment. Manually configuring location reference on each sensor node is also not possible for dense network… ▽ More

    Submitted 31 October, 2014; originally announced October 2014.

    Comments: 3 papes, 3 figures, conference proceedings