Results 21 to 30 of about 14,849 (145)

Practicing Your Protocols [PDF]

open access: yes, 2003
The purpose of this resource is to have students learn to use the hydrology instruments and collect the hydrology data accurately. In the classroom, students practice using the instruments or kits for protocols, exploring the range of measurements and ...
The GLOBE Program, UCAR (University Corporation for Atmospheric Research)
core  

Secure quantum key distribution using squeezed states [PDF]

open access: yes, 2000
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite ...
A.M. Steane   +20 more
core   +2 more sources

Networked PID control design : a pseudo-probabilistic robust approach [PDF]

open access: yes, 2009
Networked Control Systems (NCS) are feedback/feed-forward control systems where control components (sensors, actuators and controllers) are distributed across a common communication network.
Katebi, M.R., Recalde Camacho, L.
core  

The Hanabi Challenge: A New Frontier for AI Research

open access: yes, 2019
From the early days of computing, games have been important testbeds for studying how well machines can do sophisticated decision making. In recent years, machine learning has made dramatic advances with artificial agents reaching superhuman performance ...
Bard, Nolan   +14 more
core   +1 more source

Cooperation between expert knowledge and data mining discovered knowledge: Lessons learned [PDF]

open access: yes, 2012
Expert systems are built from knowledge traditionally elicited from the human expert. It is precisely knowledge elicitation from the expert that is the bottleneck in expert system construction. On the other hand, a data mining system, which automatically
Adomavicius   +20 more
core   +2 more sources

From quantum-codemaking to quantum code-breaking [PDF]

open access: yes, 1997
This is a semi-popular overview of quantum entanglement as an important physical resource in the field of data security and quantum computing. After a brief outline of entanglement's key role in philosophical debates about the meaning of quantum ...
Ekert, Artur
core   +1 more source

State-dependent Priority Scheduling for Networked Control Systems

open access: yes, 2017
Networked control systems (NCS) have attracted considerable attention in recent years. While the stabilizability and optimal control of NCS for a given communication system has already been studied extensively, the design of the communication system for ...
Blind, Rainer   +3 more
core   +1 more source

The Power of Unentanglement [PDF]

open access: yes, 2008
The class QMA(k). introduced by Kobayashi et al., consists of all languages that can be verified using k unentangled quantum proofs. Many of the simplest questions about this class have remained embarrassingly open: for example, can we give any ...
Aaronson, Scott   +4 more
core   +6 more sources

Probabilistic Routing Protocol for Intermittently Connected Networks [PDF]

open access: yes, 2012
This document is a product of the Delay Tolerant Networking Research Group and has been reviewed by that group. No objections to its publication as an RFC were raised.
Davies, Elwyn   +3 more
core   +2 more sources

Weak randomness in device independent quantum key distribution and the advantage of using high dimensional entanglement

open access: yes, 2013
We show that in device independent quantum key distribution protocols the privacy of randomness is of crucial importance. For sublinear test sample sizes even the slightest guessing probability by an eavesdropper will completely compromise security.
Huber, Marcus, Pawlowski, Marcin
core   +1 more source

Home - About - Disclaimer - Privacy