Skip to main content

Showing 1–13 of 13 results for author: Shmueli, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.16407  [pdf, ps, other

    quant-ph cs.CR

    Public-Key Quantum Fire and Key-Fire From Classical Oracles

    Authors: Alper Çakan, Vipul Goyal, Omri Shmueli

    Abstract: Quantum fire was recently formalized by Bostanci, Nehoran and Zhandry (STOC 25). This notion considers a distribution of quantum states that can be efficiently cloned, but cannot be converted into a classical string. Previously, work of Nehoran and Zhandry (ITCS 24) showed how to construct quantum fire relative to an inefficient unitary oracle. Later, the work of Bostanci, Nehoran, Zhandry gave a… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

  2. arXiv:2403.02937  [pdf, ps, other

    quant-ph cs.CC

    Quantum Algorithms in a Superposition of Spacetimes

    Authors: Omri Shmueli

    Abstract: Quantum computers are expected to revolutionize our ability to process information. The advancement from classical to quantum computing is a product of our advancement from classical to quantum physics -- the more our understanding of the universe grows, so does our ability to use it for computation. A natural question that arises is, what will physics allow in the future? Can more advanced theori… ▽ More

    Submitted 12 May, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

  3. arXiv:2307.16559  [pdf

    eess.IV cs.CV cs.LG

    Simultaneous column-based deep learning progression analysis of atrophy associated with AMD in longitudinal OCT studies

    Authors: Adi Szeskin, Roei Yehuda, Or Shmueli, Jaime Levy, Leo Joskowicz

    Abstract: Purpose: Disease progression of retinal atrophy associated with AMD requires the accurate quantification of the retinal atrophy changes on longitudinal OCT studies. It is based on finding, comparing, and delineating subtle atrophy changes on consecutive pairs (prior and current) of unregistered OCT scans. Methods: We present a fully automatic end-to-end pipeline for the simultaneous detection and… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 34 pages, 5 figures and 2 tables

  4. arXiv:2109.06339  [pdf, other

    cs.DB cs.LG

    ML Based Lineage in Databases

    Authors: Michael Leybovich, Oded Shmueli

    Abstract: We track the lineage of tuples throughout their database lifetime. That is, we consider a scenario in which tuples (records) that are produced by a query may affect other tuple insertions into the DB, as part of a normal workflow. As time goes on, exact provenance explanations for such tuples become deeply nested, increasingly consuming space, and resulting in decreased clarity and readability. We… ▽ More

    Submitted 3 October, 2021; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: 12 pages

  5. arXiv:2107.06817  [pdf, other

    cs.DS cs.AI cs.DB

    Efficient Approximate Search for Sets of Vectors

    Authors: Michael Leybovich, Oded Shmueli

    Abstract: We consider a similarity measure between two sets $A$ and $B$ of vectors, that balances the average and maximum cosine distance between pairs of vectors, one from set $A$ and one from set $B$. As a motivation for this measure, we present lineage tracking in a database. To practically realize this measure, we need an approximate search algorithm that given a set of vectors $A$ and sets of vectors… ▽ More

    Submitted 30 August, 2021; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: 8 pages, 1 figure

  6. arXiv:2007.12923  [pdf, ps, other

    cs.CR quant-ph

    Multi-theorem (Malicious) Designated-Verifier NIZK for QMA

    Authors: Omri Shmueli

    Abstract: We present the first non-interactive zero-knowledge argument system for QMA with multi-theorem security. Our protocol setup constitutes an additional improvement and is constructed in the malicious designated-verifier (MDV-NIZK) model (Quach, Rothblum, and Wichs, EUROCRYPT 2019), where the setup consists of a trusted part that includes only a common uniformly random string and an untrusted part of… ▽ More

    Submitted 25 July, 2020; originally announced July 2020.

  7. arXiv:2004.07009  [pdf, other

    cs.DB cs.LG

    NN-based Transformation of Any SQL Cardinality Estimator for Handling DISTINCT, AND, OR and NOT

    Authors: Rojeh Hayek, Oded Shmueli

    Abstract: SQL queries, with the AND, OR, and NOT operators, constitute a broad class of highly used queries. Thus, their cardinality estimation is important for query optimization. In addition, a query planner requires the set-theoretic cardinality (i.e., without duplicates) for queries with DISTINCT as well as in planning; for example, when considering sorting options. Yet, despite the importance of estima… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

  8. arXiv:2004.01976  [pdf, ps, other

    quant-ph cs.CR

    Scalable Pseudorandom Quantum States

    Authors: Zvika Brakerski, Omri Shmueli

    Abstract: Efficiently sampling a quantum state that is hard to distinguish from a truly random quantum state is an elementary task in quantum information theory that has both computational and physical uses. This is often referred to as pseudorandom (quantum) state generator, or PRS generator for short. In existing constructions of PRS generators, security scales with the number of qubits in the states, i… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

  9. arXiv:1912.04769  [pdf, ps, other

    quant-ph cs.CR

    Post-quantum Zero Knowledge in Constant Rounds

    Authors: Nir Bitansky, Omri Shmueli

    Abstract: We construct a constant-round zero-knowledge classical argument for NP secure against quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and other standard primitives, known based on the Learning with Errors Assumption for quantum algorithms. As a corollary, we also obtain a constant-round zero-knowledge quantum argument for QMA. At the heart of our protocol is a ne… ▽ More

    Submitted 20 April, 2020; v1 submitted 10 December, 2019; originally announced December 2019.

  10. arXiv:1908.07723  [pdf, other

    cs.DB cs.LG

    Improved Cardinality Estimation by Learning Queries Containment Rates

    Authors: Rojeh Hayek, Oded Shmueli

    Abstract: The containment rate of query Q1 in query Q2 over database D is the percentage of Q1's result tuples over D that are also in Q2's result over D. We directly estimate containment rates between pairs of queries over a specific database. For this, we use a specialized deep learning scheme, CRN, which is tailored to representing pairs of SQL queries. Result-cardinality estimation is a core component o… ▽ More

    Submitted 21 August, 2019; originally announced August 2019.

  11. arXiv:1906.10611  [pdf, ps, other

    quant-ph cs.CR

    (Pseudo) Random Quantum States with Binary Phase

    Authors: Zvika Brakerski, Omri Shmueli

    Abstract: We prove a quantum information-theoretic conjecture due to Ji, Liu and Song (CRYPTO 2018) which suggested that a uniform superposition with random \emph{binary} phase is statistically indistinguishable from a Haar random state. That is, any polynomial number of copies of the aforementioned state is within exponentially small trace distance from the same number of copies of a Haar random state. A… ▽ More

    Submitted 26 June, 2019; v1 submitted 25 June, 2019; originally announced June 2019.

  12. arXiv:1712.07199  [pdf, other

    cs.DB cs.AI cs.CL cs.NE

    Cognitive Database: A Step towards Endowing Relational Databases with Artificial Intelligence Capabilities

    Authors: Rajesh Bordawekar, Bortik Bandyopadhyay, Oded Shmueli

    Abstract: We propose Cognitive Databases, an approach for transparently enabling Artificial Intelligence (AI) capabilities in relational databases. A novel aspect of our design is to first view the structured data source as meaningful unstructured text, and then use the text to build an unsupervised neural network model using a Natural Language Processing (NLP) technique called word embedding. This model ca… ▽ More

    Submitted 19 December, 2017; originally announced December 2017.

  13. arXiv:1603.07185  [pdf, other

    cs.CL cs.DB

    Enabling Cognitive Intelligence Queries in Relational Databases using Low-dimensional Word Embeddings

    Authors: Rajesh Bordawekar, Oded Shmueli

    Abstract: We apply distributed language embedding methods from Natural Language Processing to assign a vector to each database entity associated token (for example, a token may be a word occurring in a table row, or the name of a column). These vectors, of typical dimension 200, capture the meaning of tokens based on the contexts in which the tokens appear together. To form vectors, we apply a learning meth… ▽ More

    Submitted 23 March, 2016; originally announced March 2016.

    Comments: Submitted to VLDB