Results 41 to 50 of about 1,164,507 (219)
On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel
We study oblivious transfer (OT) between Alice and Bob in the presence of an eavesdropper Eve over a degraded wiretapped binary erasure channel from Alice to Bob and Eve.
Dey, Bikash Kumar +3 more
core +1 more source
Juridical Narrative in Alice’s Worlds: the Dimension of the Possible
Aim of this essay is to focus on possible links between Law and Literature, using two novels by Lewis Carroll: Alice in the Wonderland e Through the Looking-Glass and what Alice Found there. Analyzing the legal experiences made by Alice in the two novels
Francesca Scamardella
doaj +1 more source
Quantum nonlocality via local contextuality with qubit-qubit entanglement
Quantum nonlocality can be revealed "via local contextuality" in qudit-qudit entangled systems with $d > 2$, that is, through the violation of inequalities containing Alice-Bob correlations that admit a local description, and Alice-Alice correlations ...
Cabello, Adán +3 more
core +1 more source
Weak randomness completely trounces the security of QKD [PDF]
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob).
C. H. Bennett +8 more
core +2 more sources
The Physics of ALICE HLT Trigger Modes [PDF]
We discuss different physics cases, mainly of the ALICE TPC, such as pile-up, jets in pp and PbPb, Bottonium and Charmonium spectroscopy, and there corresponding demands on the ALICE High Level Trigger (HLT) System.
Bramm, R. +3 more
core +3 more sources
Combination Therapy Strategies for the Treatment of Malaria
Malaria is a vector- and blood-borne infection that is responsible for a large number of deaths around the world. Most of the currently used antimalarial therapeutics suffer from drug resistance.
Sibusiso Alven, Blessing Aderibigbe
doaj +1 more source
We experimentally demonstrate a quantum key distribution (QKD) protocol using photon pairs entangled in orbit angular momentum (OAM). In our protocol, Alice and Bob modulate their OAM states on each entangled pair with spatial light modulators (SLMs ...
+15 more
core +1 more source
Evaluating Visual Conversational Agents via Cooperative Human-AI Games
As AI continues to advance, human-AI teams are inevitable. However, progress in AI is routinely measured in isolation, without a human in the loop. It is crucial to benchmark progress in AI, not just in isolation, but also in terms of how it translates ...
Batra, Dhruv +7 more
core +2 more sources
Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer [PDF]
This paper proposes to exploit the so-called reciprocity parameters (modelling non-reciprocal communication hardware) to use them as decision metric for binary hypothesis testing based authentication framework at a receiver node Bob.
Abbasi, Qammer H. +2 more
core +1 more source
Distillation of secret key and entanglement from quantum states [PDF]
We study and solve the problem of distilling secret key from quantum states representing correlation between two parties (Alice and Bob) and an eavesdropper (Eve) via one-way public discussion: we prove a coding theorem to achieve the "wire-tapper" bound,
Devetak, Igor, Winter, Andreas
core +1 more source

