Skip to main content

Showing 1–50 of 64 results for author: Kempe, J

.
  1. arXiv:2406.07515  [pdf, other

    cs.LG cs.AI stat.ML

    Beyond Model Collapse: Scaling Up with Synthesized Data Requires Reinforcement

    Authors: Yunzhen Feng, Elvis Dohmatob, Pu Yang, Francois Charton, Julia Kempe

    Abstract: Synthesized data from generative models is increasingly considered as an alternative to human-annotated data for fine-tuning Large Language Models. This raises concerns about model collapse: a drop in performance of models fine-tuned on generated data. Considering that it is easier for both humans and machines to tell between good and bad examples than to generate high-quality samples, we investig… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  2. arXiv:2406.04981  [pdf, other

    cs.LG stat.ML

    The Price of Implicit Bias in Adversarially Robust Generalization

    Authors: Nikolaos Tsilivis, Natalie Frank, Nathan Srebro, Julia Kempe

    Abstract: We study the implicit bias of optimization in robust empirical risk minimization (robust ERM) and its connection with robust generalization. In classification settings under adversarial perturbations with linear models, we study what type of regularization should ideally be applied for a given perturbation set to improve (robust) generalization. We then show that the implicit bias of optimization… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  3. arXiv:2406.02128  [pdf, other

    cs.LG cs.AI cs.CL

    Iteration Head: A Mechanistic Study of Chain-of-Thought

    Authors: Vivien Cabannes, Charles Arnal, Wassim Bouaziz, Alice Yang, Francois Charton, Julia Kempe

    Abstract: Chain-of-Thought (CoT) reasoning is known to improve Large Language Models both empirically and in terms of theoretical approximation power. However, our understanding of the inner workings and conditions of apparition of CoT capabilities remains limited. This paper helps fill this gap by demonstrating how CoT reasoning emerges in transformers in a controlled and interpretable setting. In particul… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  4. arXiv:2404.19640  [pdf, other

    cs.LG cs.AI cs.CV stat.ME stat.ML

    Attacking Bayes: On the Adversarial Robustness of Bayesian Neural Networks

    Authors: Yunzhen Feng, Tim G. J. Rudner, Nikolaos Tsilivis, Julia Kempe

    Abstract: Adversarial examples have been shown to cause neural networks to fail on a wide range of vision and language tasks, but recent work has claimed that Bayesian neural networks (BNNs) are inherently robust to adversarial perturbations. In this work, we examine this claim. To study the adversarial robustness of BNNs, we investigate whether it is possible to successfully break state-of-the-art BNN infe… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  5. arXiv:2404.05579  [pdf, other

    cs.LG cs.CV

    Robust Data Pruning: Uncovering and Overcoming Implicit Bias

    Authors: Artem Vysogorets, Kartik Ahuja, Julia Kempe

    Abstract: In the era of exceptionally data-hungry models, careful selection of the training data is essential to mitigate the extensive costs of deep learning. Data pruning offers a solution by removing redundant or uninformative samples from the dataset, which yields faster convergence and improved neural scaling laws. However, little is known about its impact on classification bias of the trained models.… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  6. arXiv:2403.09869  [pdf, other

    stat.ML cs.AI cs.LG stat.ME

    Mind the GAP: Improving Robustness to Subpopulation Shifts with Group-Aware Priors

    Authors: Tim G. J. Rudner, Ya Shi Zhang, Andrew Gordon Wilson, Julia Kempe

    Abstract: Machine learning models often perform poorly under subpopulation shifts in the data distribution. Develo** methods that allow machine learning models to better generalize to such shifts is crucial for safe deployment in real-world settings. In this paper, we develop a family of group-aware prior (GAP) distributions over neural network parameters that explicitly favor models that generalize well… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: Published in Proceedings of the 27th International Conference on Artificial Intelligence and Statistics (AISTATS 2024)

  7. arXiv:2402.07712  [pdf, other

    cs.LG cs.AI stat.ML

    Model Collapse Demystified: The Case of Regression

    Authors: Elvis Dohmatob, Yunzhen Feng, Julia Kempe

    Abstract: In the era of proliferation of large language and image generation models, the phenomenon of "model collapse" refers to the situation whereby as a model is trained recursively on data generated from previous generations of itself over time, its performance degrades until the model eventually becomes completely useless, i.e the model collapses. In this work, we study this phenomenon in the setting… ▽ More

    Submitted 30 April, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

  8. arXiv:2402.07043  [pdf, other

    cs.LG cs.AI cs.CL

    A Tale of Tails: Model Collapse as a Change of Scaling Laws

    Authors: Elvis Dohmatob, Yunzhen Feng, Pu Yang, Francois Charton, Julia Kempe

    Abstract: As AI model size grows, neural scaling laws have become a crucial tool to predict the improvements of large models when increasing capacity and the size of original (human or natural) training data. Yet, the widespread use of popular models means that the ecosystem of online data and text will co-evolve to progressively contain increased amounts of synthesized data. In this paper we ask: How will… ▽ More

    Submitted 31 May, 2024; v1 submitted 10 February, 2024; originally announced February 2024.

    Journal ref: ICML 2024

  9. arXiv:2402.03579  [pdf, other

    cs.LG math.OC

    Deconstructing the Goldilocks Zone of Neural Network Initialization

    Authors: Artem Vysogorets, Anna Dawid, Julia Kempe

    Abstract: The second-order properties of the training loss have a massive impact on the optimization dynamics of deep learning models. Fort & Scherlis (2019) discovered that a large excess of positive curvature and local convexity of the loss Hessian is associated with highly trainable initial points located in a region coined the "Goldilocks zone". Only a handful of subsequent studies touched upon this rel… ▽ More

    Submitted 4 June, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

  10. arXiv:2311.17967  [pdf, other

    cs.CV astro-ph.IM cs.LG

    Discovering Galaxy Features via Dataset Distillation

    Authors: Haowen Guan, Xuan Zhao, Zishi Wang, Zhiyang Li, Julia Kempe

    Abstract: In many applications, Neural Nets (NNs) have classification performance on par or even exceeding human capacity. Moreover, it is likely that NNs leverage underlying features that might differ from those humans perceive to classify. Can we "reverse-engineer" pertinent features to enhance our scientific understanding? Here, we apply this idea to the notoriously difficult task of galaxy classificatio… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    Comments: Accepted to NeurIPS Workshop on Machine Learning and the Physical Sciences, 2023

  11. arXiv:2311.07444  [pdf, other

    cs.LG

    On the Robustness of Neural Collapse and the Neural Collapse of Robustness

    Authors: **gtong Su, Ya Shi Zhang, Nikolaos Tsilivis, Julia Kempe

    Abstract: Neural Collapse refers to the curious phenomenon in the end of training of a neural network, where feature vectors and classification weights converge to a very simple geometrical arrangement (a simplex). While it has been observed empirically in various cases and has been theoretically motivated, its connection with crucial properties of neural networks, like their generalization and robustness,… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  12. arXiv:2311.07025  [pdf, other

    cs.LG cs.AI stat.ML

    Embarassingly Simple Dataset Distillation

    Authors: Yunzhen Feng, Ramakrishna Vedantam, Julia Kempe

    Abstract: Dataset distillation extracts a small set of synthetic training samples from a large dataset with the goal of achieving competitive performance on test data when trained on this sample. In this work, we tackle dataset distillation at its core by treating it directly as a bilevel optimization problem. Re-examining the foundational back-propagation through time method, we study the pronounced varian… ▽ More

    Submitted 12 November, 2023; originally announced November 2023.

    Comments: Short version appears at NeurIPS 2023 WANT workshop

  13. arXiv:2307.02693  [pdf, other

    cs.LG stat.ML

    Kernels, Data & Physics

    Authors: Francesco Cagnetta, Deborah Oliveira, Mahalakshmi Sabanayagam, Nikolaos Tsilivis, Julia Kempe

    Abstract: Lecture notes from the course given by Professor Julia Kempe at the summer school "Statistical physics of Machine Learning" in Les Houches. The notes discuss the so-called NTK approach to problems in machine learning, which consists of gaining an understanding of generally unsolvable problems by finding a tractable kernel formulation. The notes are mainly focused on practical applications such as… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

    Comments: These are notes from the lecture of Julia Kempe given at the summer school "Statistical Physics \& Machine Learning", that took place in Les Houches School of Physics in France from 4th to 29th July 2022

  14. arXiv:2304.09403  [pdf, other

    cs.LG cs.CV

    Wavelets Beat Monkeys at Adversarial Robustness

    Authors: **gtong Su, Julia Kempe

    Abstract: Research on improving the robustness of neural networks to adversarial noise - imperceptible malicious perturbations of the data - has received significant attention. The currently uncontested state-of-the-art defense to obtain robust deep neural networks is Adversarial Training (AT), but it consumes significantly more resources compared to standard training and trades off accuracy for robustness.… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: Machine Learning and the Physical Sciences Workshop, NeurIPS 2022

  15. arXiv:2210.05577  [pdf, other

    cs.LG cs.CR

    What Can the Neural Tangent Kernel Tell Us About Adversarial Robustness?

    Authors: Nikolaos Tsilivis, Julia Kempe

    Abstract: The adversarial vulnerability of neural nets, and subsequent techniques to create robust models have attracted significant attention; yet we still lack a full understanding of this phenomenon. Here, we study adversarial examples of trained neural networks through analytical tools afforded by recent theory advances connecting neural networks and kernel methods, namely the Neural Tangent Kernel (NTK… ▽ More

    Submitted 30 January, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

    Comments: NeurIPS 2022; added link to GitHub repository

  16. arXiv:2210.01987  [pdf, other

    cs.CV cs.LG

    ImpressLearn: Continual Learning via Combined Task Impressions

    Authors: Dhrupad Bhardwaj, Julia Kempe, Artem Vysogorets, Angela M. Teng, Evaristus C. Ezekwem

    Abstract: This work proposes a new method to sequentially train deep neural networks on multiple tasks without suffering catastrophic forgetting, while endowing it with the capability to quickly adapt to unseen tasks. Starting from existing work on network masking (Wortsman et al., 2020), we show that simply learning a linear combination of a small number of task-specific supermasks (impressions) on a rando… ▽ More

    Submitted 31 January, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

  17. arXiv:2207.11727  [pdf, other

    cs.LG cs.CV

    Can we achieve robustness from data alone?

    Authors: Nikolaos Tsilivis, **gtong Su, Julia Kempe

    Abstract: We introduce a meta-learning algorithm for adversarially robust classification. The proposed method tries to be as model agnostic as possible and optimizes a dataset prior to its deployment in a machine learning system, aiming to effectively erase its non-robust features. Once the dataset has been created, in principle no specialized algorithm (besides standard gradient descent) is needed to train… ▽ More

    Submitted 30 January, 2023; v1 submitted 24 July, 2022; originally announced July 2022.

  18. arXiv:2107.02306  [pdf, other

    cs.LG cs.CV

    Connectivity Matters: Neural Network Pruning Through the Lens of Effective Sparsity

    Authors: Artem Vysogorets, Julia Kempe

    Abstract: Neural network pruning is a fruitful area of research with surging interest in high sparsity regimes. Benchmarking in this domain heavily relies on faithful representation of the sparsity of subnetworks, which has been traditionally computed as the fraction of removed connections (direct sparsity). This definition, however, fails to recognize unpruned parameters that detached from input or output… ▽ More

    Submitted 7 April, 2023; v1 submitted 5 July, 2021; originally announced July 2021.

  19. Hardness of approximation for quantum problems

    Authors: Sevag Gharibian, Julia Kempe

    Abstract: The polynomial hierarchy plays a central role in classical complexity theory. Here, we define a quantum generalization of the polynomial hierarchy, and initiate its study. We show that not only are there natural complete problems for the second level of this quantum hierarchy, but that these problems are in fact hard to approximate. Using these techniques, we also obtain hardness of approximation… ▽ More

    Submitted 5 September, 2012; originally announced September 2012.

    Comments: 21 pages, 1 figure, extended abstract appeared in Proceedings of the 39th International Colloquium on Automata, Languages and Programming (ICALP), pages 387-398, Springer, 2012

    Journal ref: Quantum Information & Computation 14 (5 & 6): 517-540, 2014. Also in Proceedings of ICALP 2012

  20. arXiv:1101.3884  [pdf, ps, other

    quant-ph cs.CC

    Approximation algorithms for QMA-complete problems

    Authors: Sevag Gharibian, Julia Kempe

    Abstract: Approximation algorithms for classical constraint satisfaction problems are one of the main research areas in theoretical computer science. Here we define a natural approximation version of the QMA-complete local Hamiltonian problem and initiate its study. We present two main results. The first shows that a non-trivial approximation ratio can be obtained in the class NP using product states. The s… ▽ More

    Submitted 20 January, 2011; originally announced January 2011.

    Comments: 22 pages, comments welcome

    Journal ref: SIAM Journal on Computing 41(4): 1028-1050, 2012. Also in Proceedings of 26th IEEE Conference on Computational Complexity (CCC), 178-188, 2011

  21. arXiv:1012.4728  [pdf, ps, other

    quant-ph

    Parallel Repetition of Entangled Games

    Authors: Julia Kempe, Thomas Vidick

    Abstract: We consider one-round games between a classical referee and two players. One of the main questions in this area is the parallel repetition question: Is there a way to decrease the maximum winning probability of a game without increasing the number of rounds or the number of players? Classically, efforts to resolve this question, open for many years, have culminated in Raz's celebrated parallel rep… ▽ More

    Submitted 11 May, 2011; v1 submitted 21 December, 2010; originally announced December 2010.

    Comments: v2: minor fixes and explanations added

  22. arXiv:1005.0512  [pdf, ps, other

    quant-ph cs.CC

    Two-Source Extractors Secure Against Quantum Adversaries

    Authors: Roy Kasher, Julia Kempe

    Abstract: We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two quantum adversaries store a bounded amount of information. Our main result is a two-source extractor secure against quantum adversaries, with parameters closely matching the classical case and tight in several instances. M… ▽ More

    Submitted 4 May, 2010; originally announced May 2010.

    Comments: 20 pages, no figures

  23. A Quantum Lovasz Local Lemma

    Authors: Andris Ambainis, Julia Kempe, Or Sattath

    Abstract: The Lovasz Local Lemma (LLL) is a powerful tool in probability theory to show the existence of combinatorial objects meeting a prescribed collection of "weakly dependent" criteria. We show that the LLL extends to a much more general geometric setting, where events are replaced with subspaces and probability is replaced with relative dimension, which allows to lower bound the dimension of the int… ▽ More

    Submitted 9 November, 2009; originally announced November 2009.

    Comments: 19 pages

    Journal ref: Journal of the ACM, Volume 59 Issue 5, October 2012, Article No. 24

  24. arXiv:0911.0201  [pdf, ps, other

    quant-ph cs.CC

    No Strong Parallel Repetition with Entangled and Non-signaling Provers

    Authors: Julia Kempe, Oded Regev

    Abstract: We consider one-round games between a classical verifier and two provers. One of the main questions in this area is the \emph{parallel repetition question}: If the game is played $\ell$ times in parallel, does the maximum winning probability decay exponentially in $\ell$? In the classical setting, this question was answered in the affirmative by Raz. More recently the question arose whether the… ▽ More

    Submitted 1 November, 2009; originally announced November 2009.

    Comments: 15 pages, 2 figures

  25. arXiv:0802.1464  [pdf, ps, other

    quant-ph

    Upper Bounds on the Noise Threshold for Fault-tolerant Quantum Computing

    Authors: Julia Kempe, Oded Regev, Falk Unger, Ronald de Wolf

    Abstract: We prove new upper bounds on the tolerable level of noise in a quantum circuit. We consider circuits consisting of unitary k-qubit gates each of whose input wires is subject to depolarizing noise of strength p, as well as arbitrary one-qubit gates that are essentially noise-free. We assume that the output of the circuit is the result of measuring some designated qubit in the final state. Our mai… ▽ More

    Submitted 11 February, 2008; originally announced February 2008.

    Comments: 14 pages, 3 figures

  26. arXiv:0711.3715  [pdf, ps, other

    quant-ph

    Using Entanglement in Quantum Multi-Prover Interactive Proofs

    Authors: Julia Kempe, Hirotada Kobayashi, Keiji Matsumoto, Thomas Vidick

    Abstract: The central question in quantum multi-prover interactive proof systems is whether or not entanglement shared between provers affects the verification power of the proof system. We study for the first time positive aspects of prior entanglement and show that entanglement is useful even for honest provers. We show how to use shared entanglement to parallelize any multi-prover quantum interactive p… ▽ More

    Submitted 23 November, 2007; originally announced November 2007.

    Comments: 19 pages

  27. arXiv:0710.0655  [pdf, ps, other

    quant-ph

    Unique Games with Entangled Provers are Easy

    Authors: Julia Kempe, Oded Regev, Ben Toner

    Abstract: We consider one-round games between a classical verifier and two provers who share entanglement. We show that when the constraints enforced by the verifier are `unique' constraints (i.e., permutations), the value of the game can be well approximated by a semidefinite program. Essentially the only algorithm known previously was for the special case of binary answers, as follows from the work of T… ▽ More

    Submitted 3 October, 2009; v1 submitted 2 October, 2007; originally announced October 2007.

    Comments: 25 pages, revised version, contains parallel repetition result

  28. The power of quantum systems on a line

    Authors: Dorit Aharonov, Daniel Gottesman, Sandy Irani, Julia Kempe

    Abstract: We study the computational strength of quantum particles (each of finite dimensionality) arranged on a line. First, we prove that it is possible to perform universal adiabatic quantum computation using a one-dimensional quantum system (with 9 states per particle). This might have practical implications for experimentalists interested in constructing an adiabatic quantum computer. Building on the… ▽ More

    Submitted 19 February, 2009; v1 submitted 28 May, 2007; originally announced May 2007.

    Comments: 21 pages. v2 has numerous corrections and clarifications, and most importantly a new author, merged from arXiv:0705.4067. v3 is the published version, with additional clarifications, publisher's version available at http://www.springerlink.com

    Journal ref: Comm. Math. Physics, vol. 287, no. 1, pp. 41-65 (2009)

  29. arXiv:0704.2903  [pdf, ps, other

    quant-ph

    Entangled games are hard to approximate

    Authors: Julia Kempe, Hirotada Kobayashi, Keiji Matsumoto, Ben Toner, Thomas Vidick

    Abstract: We establish the first hardness results for the problem of computing the value of one-round games played by a verifier and a team of provers who can share quantum entanglement. In particular, we show that it is NP-hard to approximate within an inverse polynomial the value of a one-round game with (i) quantum verifier and two entangled provers or (ii) classical verifier and three entangled prover… ▽ More

    Submitted 21 November, 2007; v1 submitted 23 April, 2007; originally announced April 2007.

    Comments: 26 pages, complete and much improved version with stronger results, supersedes the results in arXiv:quant-ph/0612063 proved with different techniques

  30. arXiv:quant-ph/0612185  [pdf, ps, other

    quant-ph

    Approaches to Quantum Error Correction

    Authors: Julia Kempe

    Abstract: The purpose of this little survey is to give a simple description of the main approaches to quantum error correction and quantum fault-tolerance. Our goal is to convey the necessary intuitions both for the problems and their solutions in this area. After characterising quantum errors we present several error-correction schemes and outline the elements of a full fledged fault-tolerant computation… ▽ More

    Submitted 21 December, 2006; originally announced December 2006.

    Comments: 29 pages, 5 figures, survey written for Poincare seminar lecture 19 Nov. 2005. Bookchapter in "Quantum Decoherence", Poincare seminar 2005, Progress in Mathematical Physics series, Birhaeuser, p. 85--123, 2006

  31. arXiv:quant-ph/0612063  [pdf, ps, other

    quant-ph

    On the Power of Entangled Quantum Provers

    Authors: Julia Kempe, Thomas Vidick

    Abstract: We show that the value of a general two-prover quantum game cannot be computed by a semi-definite program ofvpolynomial size (unless P=NP), a method that has been successful in more restricted quantum games. More precisely, we show that proof of membership in the NP-complete problem GAP-3D-Matching can be obtained by a 2-prover, 1-round quantum interactive proof system where the provers share en… ▽ More

    Submitted 8 December, 2006; originally announced December 2006.

    Comments: 17 pages

  32. arXiv:quant-ph/0611209  [pdf, ps, other

    quant-ph

    Exponential separations for one-way quantum communication complexity, with applications to cryptography

    Authors: Dmytro Gavinsky, Julia Kempe, Iordanis Kerenidis, Ran Raz, Ronald de Wolf

    Abstract: We give an exponential separation between one-way quantum and classical communication protocols for a partial Boolean function (a variant of the Boolean Hidden Matching Problem of Bar-Yossef et al.) Earlier such an exponential separation was known only for a relational problem. The communication problem corresponds to a \emph{strong extractor} that fails against a small amount of \emph{quantum}… ▽ More

    Submitted 13 February, 2008; v1 submitted 20 November, 2006; originally announced November 2006.

    Comments: 16 pages, improved version, supersedes quant-ph/0607173 and quant-ph/0607174 although some proofs are different

    Journal ref: Proc. 39th STOC, p. 516-525 (2007)

  33. arXiv:quant-ph/0607204  [pdf, ps, other

    quant-ph math.GR

    Permutation groups, minimal degrees and quantum computing

    Authors: Julia Kempe, Laszlo Pyber, Aner Shalev

    Abstract: We study permutation groups of given minimal degree without the classical primitivity assumption. We provide sharp upper bounds on the order of a permutation group of minimal degree m and on the number of its elements of any given support. These results contribute to the foundations of a non-commutative coding theory. A main application of our results concerns the Hidden Subgroup Problem for t… ▽ More

    Submitted 28 July, 2006; originally announced July 2006.

    Comments: 28 pages, no figures

  34. arXiv:quant-ph/0607174  [pdf, ps, other

    quant-ph cs.CC

    Exponential Separation of Quantum and Classical One-Way Communication Complexity for a Boolean Function

    Authors: Dmytro Gavinsky, Julia Kempe, Ronald de Wolf

    Abstract: We give an exponential separation between one-way quantum and classical communication complexity for a Boolean function. Earlier such a separation was known only for a relation. A very similar result was obtained earlier but independently by Kerenidis and Raz [KR06]. Our version of the result gives an example in the bounded storage model of cryptography, where the key is secure if the adversary… ▽ More

    Submitted 25 July, 2006; originally announced July 2006.

    Comments: 8 pages, no figures

  35. arXiv:quant-ph/0603173  [pdf, ps, other

    quant-ph cs.CC

    Strengths and Weaknesses of Quantum Fingerprinting

    Authors: Dmytro Gavinsky, Julia Kempe, Ronald de Wolf

    Abstract: We study the power of quantum fingerprints in the simultaneous message passing (SMP) setting of communication complexity. Yao recently showed how to simulate, with exponential overhead, classical shared-randomness SMP protocols by means of quantum SMP protocols without shared randomness ($Q^\parallel$-protocols). Our first result is to extend Yao's simulation to the strongest possible model: eve… ▽ More

    Submitted 20 March, 2006; originally announced March 2006.

    Comments: 13 pages, no figures, to appear in CCC'06

    Journal ref: Proc. 21st CCC (Complexity), p. 288-295 (2006)

  36. arXiv:quant-ph/0511013  [pdf, ps, other

    quant-ph cs.CC

    Bounded-Error Quantum State Identification and Exponential Separations in Communication Complexity

    Authors: Dmytro Gavinsky, Julia Kempe, Oded Regev, Ronald de Wolf

    Abstract: We consider the problem of bounded-error quantum state identification: given either state α_0 or state α_1, we are required to output `0', `1' or `?' ("don't know"), such that conditioned on outputting `0' or `1', our guess is correct with high probability. The goal is to maximize the probability of not outputting `?'. We prove a direct product theorem: if we're given two such problems, with opt… ▽ More

    Submitted 2 November, 2005; originally announced November 2005.

    Comments: 20 pages, no figures

  37. arXiv:quant-ph/0411051  [pdf, ps, other

    quant-ph cs.CC

    Quantum Communication Cannot Simulate a Public Coin

    Authors: Dmytro Gavinsky, Julia Kempe, Ronald de Wolf

    Abstract: We study the simultaneous message passing model of communication complexity. Building on the quantum fingerprinting protocol of Buhrman et al., Yao recently showed that a large class of efficient classical public-coin protocols can be turned into efficient quantum protocols without public coin. This raises the question whether this can be done always, i.e. whether quantum communication can alway… ▽ More

    Submitted 8 November, 2004; originally announced November 2004.

    Comments: 12 pages LaTeX

  38. Generalized Performance of Concatenated Quantum Codes -- A Dynamical Systems Approach

    Authors: Jesse Fern, Julia Kempe, Slobodan Simic, Shankar Sastry

    Abstract: We apply a dynamical systems approach to concatenation of quantum error correcting codes, extending and generalizing the results of Rahn et al. [1] to both diagonal and nondiagonal channels. Our point of view is global: instead of focusing on particular types of noise channels, we study the geometry of the coding map as a discrete-time dynamical system on the entire space of noise channels. In t… ▽ More

    Submitted 15 March, 2006; v1 submitted 15 September, 2004; originally announced September 2004.

    Comments: 12 pages two-column format, no figures, slightly revised version

    Journal ref: IEEE Trans. on Automatic Control 51:448-459 (March 2006)

  39. arXiv:cond-mat/0407780  [pdf, ps, other

    cond-mat.supr-con cond-mat.mes-hall quant-ph

    Full protection of superconducting qubit systems from coupling errors

    Authors: M. J. Storcz, J. Vala, K. R. Brown, J. Kempe, F. K. Wilhelm, K. B. Whaley

    Abstract: Solid state qubits realized in superconducting circuits are potentially extremely scalable. However, strong decoherence may be transferred to the qubits by various elements of the circuits that couple individual qubits, particularly when coupling is implemented over long distances. We propose here an encoding that provides full protection against errors originating from these coupling elements,… ▽ More

    Submitted 9 August, 2005; v1 submitted 29 July, 2004; originally announced July 2004.

    Comments: 4 pages, 1 figure

    Report number: LMU-ASC 34/05

    Journal ref: Phys. Rev. B 72, 064511 (2005)

  40. arXiv:quant-ph/0406180  [pdf, ps, other

    quant-ph cs.CC

    The Complexity of the Local Hamiltonian Problem

    Authors: Julia Kempe, Alexei Kitaev, Oded Regev

    Abstract: The k-local Hamiltonian problem is a natural complete problem for the complexity class QMA, the quantum analog of NP. It is similar in spirit to MAX-k-SAT, which is NP-complete for k<=2. It was known that the problem is QMA-complete for any k <= 3. On the other hand 1-local Hamiltonian is in P, and hence not believed to be QMA-complete. The complexity of the 2-local Hamiltonian problem has long… ▽ More

    Submitted 2 October, 2005; v1 submitted 24 June, 2004; originally announced June 2004.

    Comments: 30 pages, 3 figures, replaced with revised version, numerous improvements to readability and expanded adiabatic section

    Journal ref: SIAM Journal of Computing, Vol. 35(5), p. 1070-1097 (2006), conference version in Proc. 24th FSTTCS, p. 372-383 (2004)

  41. arXiv:quant-ph/0406046  [pdf, ps, other

    quant-ph cs.CC

    The hidden subgroup problem and permutation group theory

    Authors: Julia Kempe, Aner Shalev

    Abstract: We employ concepts and tools from the theory of finite permutation groups in order to analyse the Hidden Subgroup Problem via Quantum Fourier Sampling (QFS) for the symmetric group. We show that under very general conditions both the weak and the random-strong form (strong form with random choices of basis) of QFS fail to provide any advantage over classical exhaustive search. In particular we g… ▽ More

    Submitted 8 June, 2004; originally announced June 2004.

    Comments: 12 pages

    Journal ref: Proc. 16th ACM-SIAM SODA, p. 1118-1125 (2005)

  42. arXiv:quant-ph/0405098  [pdf, ps, other

    quant-ph

    Adiabatic Quantum Computation is Equivalent to Standard Quantum Computation

    Authors: Dorit Aharonov, Wim van Dam, Julia Kempe, Zeph Landau, Seth Lloyd, Oded Regev

    Abstract: Adiabatic quantum computation has recently attracted attention in the physics and computer science communities, but its computational power was unknown. We describe an efficient adiabatic simulation of any given quantum algorithm, which implies that the adiabatic computation model and the conventional quantum computation model are polynomially equivalent. Our result can be extended to the physic… ▽ More

    Submitted 26 March, 2005; v1 submitted 18 May, 2004; originally announced May 2004.

    Comments: 30 pages, updated version

    Journal ref: SIAM Journal of Computing, Vol. 37, Issue 1, p. 166-194 (2007), conference version in Proc. 45th FOCS, p. 42-51 (2004)

  43. arXiv:quant-ph/0405086  [pdf, ps, other

    quant-ph

    Quantum Color-Coding Is Better

    Authors: Joshua Von Korff, Julia Kempe

    Abstract: We describe a quantum scheme to ``color-code'' a set of objects in order to record which one is which. In the classical case, N distinct colors are required to color-code N objects. We show that in the quantum case, only N/e distinct ``colors'' are required, where e = 2.71828 . . . If the number of colors is less than optimal, the objects may still be correctly distinguished with some success pr… ▽ More

    Submitted 16 May, 2004; originally announced May 2004.

    Comments: 4 pages

    Journal ref: Phys. Rev. Lett., Vol. 93 (26), 260502 (2004); new title "Quantum Advantage in Transmitting a Permutation"

  44. arXiv:quant-ph/0402107  [pdf, ps, other

    quant-ph cs.DS

    Coins Make Quantum Walks Faster

    Authors: Andris Ambainis, Julia Kempe, Alexander Rivosh

    Abstract: We show how to search N items arranged on a $\sqrt{N}\times\sqrt{N}$ grid in time $O(\sqrt N \log N)$, using a discrete time quantum walk. This result for the first time exhibits a significant difference between discrete time and continuous time walks without coin degrees of freedom, since it has been shown recently that such a continuous time walk needs time $Ω(N)$ to perform the same task. Our… ▽ More

    Submitted 16 February, 2004; originally announced February 2004.

    Comments: 25 pages, no figures

    Journal ref: Proc. 16th ACM-SIAM SODA, p. 1099-1108 (2005)

  45. arXiv:quant-ph/0309002  [pdf, ps, other

    quant-ph

    An Explicit Universal Gate-set for Exchange-Only Quantum Computation

    Authors: M. Hsieh, J. Kempe, S. Myrgren, K. B. Whaley

    Abstract: A single physical interaction might not be universal for quantum computation in general. It has been shown, however, that in some cases it can generate universal quantum computation over a subspace. For example, by encoding logical qubits into arrays of multiple physical qubits, a single isotropic or anisotropic exchange interaction can generate a universal logical gate-set. Recently, encoded un… ▽ More

    Submitted 22 December, 2003; v1 submitted 29 August, 2003; originally announced September 2003.

    Comments: 16 pages, 6 figures, new appendix and figures, revised version as accepted for publication

    Journal ref: Quantum Information Processing, Vol. 2 (4), p. 289-307, 2003

  46. Quantum random walks - an introductory overview

    Authors: Julia Kempe

    Abstract: This article aims to provide an introductory survey on quantum random walks. Starting from a physical effect to illustrate the main ideas we will introduce quantum random walks, review some of their properties and outline their striking differences to classical walks. We will touch upon both physical effects and computer science applications, introducing some of the main concepts and language of… ▽ More

    Submitted 13 March, 2003; originally announced March 2003.

    Comments: 20 pages, 13 figures, to appear in Contemporary Physics

    Journal ref: Contemporary Physics, Vol. 44 (4), p.307-327, 2003

  47. arXiv:quant-ph/0302079  [pdf, ps, other

    quant-ph cs.CC

    3-Local Hamiltonian is QMA-complete

    Authors: Julia Kempe, Oded Regev

    Abstract: It has been shown by Kitaev that the 5-local Hamiltonian problem is QMA-complete. Here we reduce the locality of the problem by showing that 3-local Hamiltonian is already QMA-complete.

    Submitted 20 May, 2003; v1 submitted 10 February, 2003; originally announced February 2003.

    Comments: 7 pages, minor changes and corrections, published version

    Journal ref: Quantum Computation and Information, Vol. 3(3), p. 258-64, 2003

  48. A Quantum Random Walk Search Algorithm

    Authors: Neil Shenvi, Julia Kempe, K. Birgitta Whaley

    Abstract: Quantum random walks on graphs have been shown to display many interesting properties, including exponentially fast hitting times when compared with their classical counterparts. However, it is still unclear how to use these novel properties to gain an algorithmic speed-up over classical algorithms. In this paper, we present a quantum search algorithm based on the quantum random walk architectur… ▽ More

    Submitted 9 October, 2002; originally announced October 2002.

    Comments: 13 pages, 3 figures

    Journal ref: Phys. Rev. A, Vol. 67 (5), 052307 (2003)

  49. arXiv:quant-ph/0205083  [pdf, ps, other

    quant-ph cs.CC

    Quantum Random Walks Hit Exponentially Faster

    Authors: Julia Kempe

    Abstract: We show that the hitting time of the discrete time quantum random walk on the n-bit hypercube from one corner to its opposite is polynomial in n. This gives the first exponential quantum-classical gap in the hitting time of discrete quantum random walks. We provide the framework for quantum hitting time and give two alternative definitions to set the ground for its study on general graphs. We th… ▽ More

    Submitted 14 May, 2002; originally announced May 2002.

    Comments: 15 pages, no Figures

    Journal ref: Probability Theory and Related Fields, Vol. 133(2), p. 215-235 (2005), conference version in Proc. 7th RANDOM, p. 354-69, 2003

  50. Exact gate-sequences for universal quantum computation using the XY-interaction alone

    Authors: J. Kempe, K. B. Whaley

    Abstract: In a previous publication [1] we showed that it is possible to implement universal quantum computation with the anisotropic XY-Heisenberg exchange acting as a single interaction. To achieve this we used encodings of the states of the computation into a larger Hilbert space. This proof is non- constructive, however, and did not explicitly give the trade-offs in time that are required to implement… ▽ More

    Submitted 22 May, 2002; v1 submitted 3 December, 2001; originally announced December 2001.

    Comments: 6 pages, 5 figures

    Journal ref: Phys. Rev. A, Vol. 65 (5), 052330 (2002)