Results 11 to 20 of about 1,008,443 (223)
Relay-proof channels using UWB lasers [PDF]
Alice is a hand-held device. Bob is a device providing a service, such as an ATM, an automatic door, or an anti-aircraft gun pointing at the gyro-copter in which Alice is travelling.
Christianson, B.+3 more
core +1 more source
Parallel repetition: simplifications and the no-signaling case [PDF]
Consider a game where a refereed a referee chooses (x,y) according to a publicly known distribution P_XY, sends x to Alice, and y to Bob. Without communicating with each other, Alice responds with a value "a" and Bob responds with a value "b".
Holenstein, Thomas
core +3 more sources
Charge Violation and Alice Behavior in Global and Textured Strings [PDF]
Spontaneous breaking of global symmetries can produce ``Alice'' strings: line defects which make unbroken symmetries multivalued, induce apparent charge violation via Aharonov-Bohm interactions, and form point defects when twisted into loops.
A. Balachandran+14 more
core +2 more sources
Causal and localizable quantum operations [PDF]
We examine constraints on quantum operations imposed by relativistic causality. A bipartite superoperator is said to be localizable if it can be implemented by two parties (Alice and Bob) who share entanglement but do not communicate; it is causal if the
A. Peres+27 more
core +3 more sources
A Meaner King uses Biased Bases [PDF]
The mean king problem is a quantum mechanical retrodiction problem, in which Alice has to name the outcome of an ideal measurement on a d-dimensional quantum system, made in one of (d+1) orthonormal bases, unknown to Alice at the time of the measurement.
A. P. Dempster+5 more
core +2 more sources
Topologically Alice Strings and Monopoles
Symmetry breaking can produce ``Alice'' strings, which alter scattered charges and carry monopole number and charge when twisted into loops. Alice behavior arises algebraically, when strings obstruct unbroken symmetries -- a fragile criterion.
A. Achucarro+19 more
core +2 more sources
Secure direct communication using Einstein-Podolsky-Rosen pairs and teleportation
A novel scheme for secure direct communication between Alice and Bob is proposed, where there is no need for establishing a shared secret key. The communication is based on Einstein-Podolsky-Rosen pairs and teleportation between Alice and Bob.
101+25 more
core +2 more sources
The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel
We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve.
Dey, Bikash Kumar+3 more
core +1 more source
Quantum Communication Protocol Employing Weak Measurements [PDF]
We propose a communication protocol exploiting correlations between two events with a definite time-ordering: a) the outcome of a {\em weak measurement} on a spin, and b) the outcome of a subsequent ordinary measurement on the spin.
A.K. Ekert+18 more
core +2 more sources
At the age of fourteen, Alice began exploring the frustrations she faced as an adolescent, an artist, and a feminist—through her artistic practice. With Alice is a portrait of my cousin Alice, exploring her ever-shifting identity through painting and performance over a two-year period. Alice’s admiration for female characters that appear in 1930s, 40s
openaire +1 more source