The Least Upper Bound on the Poisson-Negative Binomial Relative Error

2012 ◽  
Vol 41 (10) ◽  
pp. 1833-1838
Author(s):  
K. Teerapabolarn
2012 ◽  
Vol 27 (26) ◽  
pp. 1250145 ◽  
Author(s):  
S. DUTTA ◽  
A. H. CHAN ◽  
C. H. OH

This paper studies the multiplicity distribution of hadrons produced in p–p collisions at 0.9 and 2.36 TeV using ALICE as a detector. The multiplicity distribution exhibits enhanced void probability. They are also found to satisfy the void probability scaling. The scaling of χ with [Formula: see text] is studied using the generalized hypergeometric model. The variation of the parameter "a" of the hyper geometric model with energy and type of events is also studied. The parameter "a" distinguishes between various theoretical models, e.g. Lorentz/Catalan, negative binomial, geometric distribution etc. Finally a comparison is made with the [Formula: see text] collisions at 200, 546 and 900 GeV. It is observed both for p–p and [Formula: see text] data, the value of "a" decreases with increase in collision energy and approach towards the upper bound or the NB model of the void probability scaling.


Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 606
Author(s):  
Hammam Qassim ◽  
Hakop Pashayan ◽  
David Gosset

In this work we improve the runtime of recent classical algorithms for strong simulation of quantum circuits composed of Clifford and T gates. The improvement is obtained by establishing a new upper bound on the stabilizer rank of m copies of the magic state |T⟩=2−1(|0⟩+eiπ/4|1⟩) in the limit of large m. In particular, we show that |T⟩⊗m can be exactly expressed as a superposition of at most O(2αm) stabilizer states, where α≤0.3963, improving on the best previously known bound α≤0.463. This furnishes, via known techniques, a classical algorithm which approximates output probabilities of an n-qubit Clifford + T circuit U with m uses of the T gate to within a given inverse polynomial relative error using a runtime poly(n,m)2αm. We also provide improved upper bounds on the stabilizer rank of symmetric product states |ψ⟩⊗m more generally; as a consequence we obtain a strong simulation algorithm for circuits consisting of Clifford gates and m instances of any (fixed) single-qubit Z-rotation gate with runtime poly(n,m)2m/2. We suggest a method to further improve the upper bounds by constructing linear codes with certain properties.


2019 ◽  
Vol 42 (6) ◽  
pp. 1786-1794 ◽  
Author(s):  
Zoran H. Perić ◽  
Jelena R. Nikolić ◽  
Marko D. Petković

1978 ◽  
Vol 27 (1-4) ◽  
pp. 155-158
Author(s):  
S.K. Ray ◽  
Ashok Sahai

The intracta bility of Best's (1974) expression for the variance of the minimum variance unbiased (MVU) estimate of tho negative binomial parameter motivated Mikulski and Smith (1976) to find an upper bound for it. In the present paper a finer upper bound is achieved.


2011 ◽  
Vol 2 (2) ◽  
Author(s):  
Martin M. Merener

We review the attack given by Dinur and Nissim [6] on the output perturbation sanitizer, and generalize it to a setting that includes, as particular cases, databases with values in {0,1}---with the metric considered in [6]---and databases with real values, with other appropriate metrics (hence the binary case is not included in the real case). Previous works [12, 14] on the binary case gave results more efficient than ours. Those results could be used to extend the binary case to the real-valued case, hence implying our results. The contributions of this paper are: to make the implication explicit, and to give an alternative general proof. We state a property about the function dist that measures the error of the attacker's approximation of the database, which is satisfied in our cases of interest, and is sufficiently strong to prove the impossibility results regarding the privacy provided by the output-perturbation sanitizer, in both the real and binary cases. In this general context we establish an inequality (an upper bound to the probability of adversary's failure) that relates all the parameters of the problem---the size of the database, the relative error of the adversary, the number of queries made by the adversary (which determines its time complexity), its probability of failure, and the perturbation of the sanitizer---making explicit the trade-offs among them. From this inequality we deduce that for binary and real valued databases, the adversary described in [6] can defeat perturbation o(n1/2) with time complexity determined by o(n log n) number of queries (instead of O(n log2 n) as in [6]).


Sign in / Sign up

Export Citation Format

Share Document