-
Complexity-constrained quantum thermodynamics
Authors:
Anthony Munson,
Naga Bhavya Teja Kothakonda,
Jonas Haferkamp,
Nicole Yunger Halpern,
Jens Eisert,
Philippe Faist
Abstract:
Quantum complexity measures the difficulty of realizing a quantum process, such as preparing a state or implementing a unitary. We present an approach to quantifying the thermodynamic resources required to implement a process if the process's complexity is restricted. We focus on the prototypical task of information erasure, or Landauer erasure, wherein an n-qubit memory is reset to the all-zero s…
▽ More
Quantum complexity measures the difficulty of realizing a quantum process, such as preparing a state or implementing a unitary. We present an approach to quantifying the thermodynamic resources required to implement a process if the process's complexity is restricted. We focus on the prototypical task of information erasure, or Landauer erasure, wherein an n-qubit memory is reset to the all-zero state. We show that the minimum thermodynamic work required to reset an arbitrary state, via a complexity-constrained process, is quantified by the state's complexity entropy. The complexity entropy therefore quantifies a trade-off between the work cost and complexity cost of resetting a state. If the qubits have a nontrivial (but product) Hamiltonian, the optimal work cost is determined by the complexity relative entropy. The complexity entropy quantifies the amount of randomness a system appears to have to a computationally limited observer. Similarly, the complexity relative entropy quantifies such an observer's ability to distinguish two states. We prove elementary properties of the complexity (relative) entropy and determine the complexity entropy's behavior under random circuits. Also, we identify information-theoretic applications of the complexity entropy. The complexity entropy quantifies the resources required for data compression if the compression algorithm must use a restricted number of gates. We further introduce a complexity conditional entropy, which arises naturally in a complexity-constrained variant of information-theoretic decoupling. Assuming that this entropy obeys a conjectured chain rule, we show that the entropy bounds the number of qubits that one can decouple from a reference system, as judged by a computationally bounded referee. Overall, our framework extends the resource-theoretic approach to thermodynamics to integrate a notion of time, as quantified by complexity.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Quantum networks with coherent routing of information through multiple nodes
Authors:
Hlér Kristjánsson,
Yan Zhong,
Anthony Munson,
Giulio Chiribella
Abstract:
Large-scale communication networks, such as the internet, rely on routing packets of data through multiple intermediate nodes to transmit information from a sender to a receiver. In this paper, we develop a model of a quantum communication network that routes information simultaneously along multiple paths passing through intermediate stations. We demonstrate that a quantum routing approach can in…
▽ More
Large-scale communication networks, such as the internet, rely on routing packets of data through multiple intermediate nodes to transmit information from a sender to a receiver. In this paper, we develop a model of a quantum communication network that routes information simultaneously along multiple paths passing through intermediate stations. We demonstrate that a quantum routing approach can in principle extend the distance over which information can be transmitted reliably. Surprisingly, the benefit of quantum routing also applies to the transmission of classical information: even if the transmitted data is purely classical, delocalising it on multiple routes can enhance the achievable transmission distance. Our findings highlight the potential of a future quantum internet not only for achieving secure quantum communication and distributed quantum computing but also for extending the range of classical data transmission.
△ Less
Submitted 26 September, 2023; v1 submitted 31 July, 2022;
originally announced August 2022.
-
Resource theory of quantum uncomplexity
Authors:
Nicole Yunger Halpern,
Naga B. T. Kothakonda,
Jonas Haferkamp,
Anthony Munson,
Jens Eisert,
Philippe Faist
Abstract:
Quantum complexity is emerging as a key property of many-body systems, including black holes, topological materials, and early quantum computers. A state's complexity quantifies the number of computational gates required to prepare the state from a simple tensor product. The greater a state's distance from maximal complexity, or "uncomplexity," the more useful the state is as input to a quantum co…
▽ More
Quantum complexity is emerging as a key property of many-body systems, including black holes, topological materials, and early quantum computers. A state's complexity quantifies the number of computational gates required to prepare the state from a simple tensor product. The greater a state's distance from maximal complexity, or "uncomplexity," the more useful the state is as input to a quantum computation. Separately, resource theories -- simple models for agents subject to constraints -- are burgeoning in quantum information theory. We unite the two domains, confirming Brown and Susskind's conjecture that a resource theory of uncomplexity can be defined. The allowed operations, fuzzy operations, are slightly random implementations of two-qubit gates chosen by an agent. We formalize two operational tasks, uncomplexity extraction and expenditure. Their optimal efficiencies depend on an entropy that we engineer to reflect complexity. We also present two monotones, uncomplexity measures that decline monotonically under fuzzy operations, in certain regimes. This work unleashes on many-body complexity the resource-theory toolkit from quantum information theory.
△ Less
Submitted 19 December, 2022; v1 submitted 21 October, 2021;
originally announced October 2021.
-
How the Design of YouTube Influences User Sense of Agency
Authors:
Kai Lukoff,
Ulrik Lyngs,
Himanshu Zade,
J. Vera Liao,
James Choi,
Kaiyue Fan,
Sean A. Munson,
Alexis Hiniker
Abstract:
In the attention economy, video apps employ design mechanisms like autoplay that exploit psychological vulnerabilities to maximize watch time. Consequently, many people feel a lack of agency over their app use, which is linked to negative life effects such as loss of sleep. Prior design research has innovated external mechanisms that police multiple apps, such as lockout timers. In this work, we s…
▽ More
In the attention economy, video apps employ design mechanisms like autoplay that exploit psychological vulnerabilities to maximize watch time. Consequently, many people feel a lack of agency over their app use, which is linked to negative life effects such as loss of sleep. Prior design research has innovated external mechanisms that police multiple apps, such as lockout timers. In this work, we shift the focus to how the internal mechanisms of an app can support user agency, taking the popular YouTube mobile app as a test case. From a survey of 120 U.S. users, we find that autoplay and recommendations primarily undermine sense of agency, while search and playlists support it. From 13 co-design sessions, we find that when users have a specific intention for how they want to use YouTube they prefer interfaces that support greater agency. We discuss implications for how designers can help users reclaim a sense of agency over their media use.
△ Less
Submitted 27 January, 2021;
originally announced January 2021.
-
From Ancient Contemplative Practice to the App Store: Designing a Digital Container for Mindfulness
Authors:
Kai Lukoff,
Ulrik Lyngs,
Stefania Gueorguieva,
Erika S. Dillman,
Alexis Hiniker,
Sean A. Munson
Abstract:
Hundreds of popular mobile apps today market their ties to mindfulness. What activities do these apps support and what benefits do they claim? How do mindfulness teachers, as domain experts, view these apps? We first conduct an exploratory review of 370 mindfulness-related apps on Google Play, finding that mindfulness is presented primarily as a tool for relaxation and stress reduction. We then in…
▽ More
Hundreds of popular mobile apps today market their ties to mindfulness. What activities do these apps support and what benefits do they claim? How do mindfulness teachers, as domain experts, view these apps? We first conduct an exploratory review of 370 mindfulness-related apps on Google Play, finding that mindfulness is presented primarily as a tool for relaxation and stress reduction. We then interviewed 15 U.S. mindfulness teachers from the therapeutic, Buddhist, and Yogic traditions about their perspectives on these apps. Teachers expressed concern that apps that introduce mindfulness only as a tool for relaxation neglect its full potential. We draw upon the experiences of these teachers to suggest design implications for linking mindfulness with further contemplative practices like the cultivation of compassion. Our findings speak to the importance of coherence in design: that the metaphors and mechanisms of a technology align with the underlying principles it follows.
△ Less
Submitted 16 June, 2020;
originally announced June 2020.
-
AND-gates in ZX-calculus: Spider Nest Identities and QBC-completeness
Authors:
Anthony Munson,
Bob Coecke,
Quanlong Wang
Abstract:
In this paper we exploit the utility of the triangle symbol which has a complicated expression in terms of spider diagrams in ZX-calculus, and its role within the ZX-representation of AND-gates in particular. First, we derive spider nest identities which are of key importance to recent developments in quantum circuit optimisation and T-count reduction in particular. Then, using the same rule set…
▽ More
In this paper we exploit the utility of the triangle symbol which has a complicated expression in terms of spider diagrams in ZX-calculus, and its role within the ZX-representation of AND-gates in particular. First, we derive spider nest identities which are of key importance to recent developments in quantum circuit optimisation and T-count reduction in particular. Then, using the same rule set, we prove a completeness theorem for quantum Boolean circuits (QBCs) whose rewriting rules can be directly used for a new method of T-count reduction. We give an algorithm based on this method and show that the results of our algorithm outperform the results of all the previous best non-probabilistic algorithms.
△ Less
Submitted 5 September, 2021; v1 submitted 15 October, 2019;
originally announced October 2019.
-
Reframing Threat Detection: Inside esINSIDER
Authors:
M. Arthur Munson,
Jason Kichen,
Dustin Hillard,
Ashley Fidler,
Peiter Zatko
Abstract:
We describe the motivation and design for esINSIDER, an automated tool that detects potential persistent and insider threats in a network. esINSIDER aggregates clues from log data, over extended time periods, and proposes a small number of cases for human experts to review. The proposed cases package together related information so the analyst can see a bigger picture of what is happening, and the…
▽ More
We describe the motivation and design for esINSIDER, an automated tool that detects potential persistent and insider threats in a network. esINSIDER aggregates clues from log data, over extended time periods, and proposes a small number of cases for human experts to review. The proposed cases package together related information so the analyst can see a bigger picture of what is happening, and their evidence includes internal network activity resembling reconnaissance and data collection.
The core ideas are to 1) detect fundamental campaign behaviors by following data movements over extended time periods, 2) link together behaviors associated with different meta-goals, and 3) use machine learning to understand what activities are expected and consistent for each individual network. We call this approach campaign analytics because it focuses on the threat actor's campaign goals and the intrinsic steps to achieve them. Linking different campaign behaviors (internal reconnaissance, collection, exfiltration) reduces false positives from business-as-usual activities and creates opportunities to detect threats before a large exfiltration occurs. Machine learning makes it practical to deploy this approach by reducing the amount of tuning needed.
△ Less
Submitted 7 April, 2019;
originally announced April 2019.
-
A purely homotopy theoretic proof of the Blakers-Massey Theorem for $n$-cubes
Authors:
Brian A. Munson
Abstract:
Goodwillie's proof of the Blakers-Massey Theorem for $n$-cubes relies on a lemma whose proof invokes transversality. The rest of his proof follows from general facts about cubes of spaces and connectivities of maps. We present a purely homotopy-theoretic proof of this lemma. The methods are elementary, using a generalization and modification of an argument originally due to Puppe used to prove the…
▽ More
Goodwillie's proof of the Blakers-Massey Theorem for $n$-cubes relies on a lemma whose proof invokes transversality. The rest of his proof follows from general facts about cubes of spaces and connectivities of maps. We present a purely homotopy-theoretic proof of this lemma. The methods are elementary, using a generalization and modification of an argument originally due to Puppe used to prove the Blakers-Massey Theorem for squares.
△ Less
Submitted 7 April, 2014; v1 submitted 30 May, 2012;
originally announced May 2012.
-
Configuration space integrals and the cohomology of the space of homotopy string links
Authors:
Robin Koytcheff,
Brian A. Munson,
Ismar Volic
Abstract:
Configuration space integrals have in recent years been used for studying the cohomology of spaces of (string) knots and links in $\mathbb{R}^n$ for $n>3$ since they provide a map from a certain differential algebra of diagrams to the deRham complex of differential forms on the spaces of knots and links. We refine this construction so that it now applies to the space of homotopy string links -- th…
▽ More
Configuration space integrals have in recent years been used for studying the cohomology of spaces of (string) knots and links in $\mathbb{R}^n$ for $n>3$ since they provide a map from a certain differential algebra of diagrams to the deRham complex of differential forms on the spaces of knots and links. We refine this construction so that it now applies to the space of homotopy string links -- the space of smooth maps of some number of copies of $\mathbb{R}$ in $\mathbb{R}^n$ with fixed behavior outside a compact set and such that the images of the copies of $\R$ are disjoint -- even for $n=3$. We further study the case $n=3$ in degree zero and show that our integrals represent a universal finite type invariant of the space of classical homotopy string links. As a consequence, we obtain configuration space integral expressions for Milnor invariants of string links.
△ Less
Submitted 6 August, 2013; v1 submitted 31 August, 2011;
originally announced September 2011.
-
COMET: A Recipe for Learning and Using Large Ensembles on Massive Data
Authors:
Justin D. Basilico,
M. Arthur Munson,
Tamara G. Kolda,
Kevin R. Dixon,
W. Philip Kegelmeyer
Abstract:
COMET is a single-pass MapReduce algorithm for learning on large-scale data. It builds multiple random forest ensembles on distributed blocks of data and merges them into a mega-ensemble. This approach is appropriate when learning from massive-scale data that is too large to fit on a single machine. To get the best accuracy, IVoting should be used instead of bagging to generate the training subset…
▽ More
COMET is a single-pass MapReduce algorithm for learning on large-scale data. It builds multiple random forest ensembles on distributed blocks of data and merges them into a mega-ensemble. This approach is appropriate when learning from massive-scale data that is too large to fit on a single machine. To get the best accuracy, IVoting should be used instead of bagging to generate the training subset for each decision tree in the random forest. Experiments with two large datasets (5GB and 50GB compressed) show that COMET compares favorably (in both accuracy and training time) to learning on a subsample of data using a serial algorithm. Finally, we propose a new Gaussian approach for lazy ensemble evaluation which dynamically decides how many ensemble members to evaluate per data point; this can reduce evaluation cost by 100X or more.
△ Less
Submitted 8 September, 2011; v1 submitted 10 March, 2011;
originally announced March 2011.
-
Introduction to the manifold calculus of Goodwillie-Weiss
Authors:
Brian A. Munson
Abstract:
We present an introduction to the manifold calculus of functors, due to Goodwillie and Weiss. Our perspective focuses on the role the derivatives of a functor F play in this theory, and the analogies with ordinary calculus. We survey the construction of polynomial functors, the classification of homogeneous functors, and results regarding convergence of the Taylor tower. We sprinkle examples throu…
▽ More
We present an introduction to the manifold calculus of functors, due to Goodwillie and Weiss. Our perspective focuses on the role the derivatives of a functor F play in this theory, and the analogies with ordinary calculus. We survey the construction of polynomial functors, the classification of homogeneous functors, and results regarding convergence of the Taylor tower. We sprinkle examples throughout, and pay special attention to spaces of smooth embeddings.
△ Less
Submitted 10 May, 2010;
originally announced May 2010.
-
A stable range description of the space of link maps
Authors:
Thomas G. Goodwillie,
Brian A. Munson
Abstract:
We study the space of link maps, which are smooth maps from the disjoint union of manifolds P and Q to a manifold N such that the images of P and Q are disjoint. We give a range of dimensions, interpreted as the connectivity of a certain map, in which the cobordism class of the "linking manifold" is enough to distinguish the homotopy class of one link map from another.
We study the space of link maps, which are smooth maps from the disjoint union of manifolds P and Q to a manifold N such that the images of P and Q are disjoint. We give a range of dimensions, interpreted as the connectivity of a certain map, in which the cobordism class of the "linking manifold" is enough to distinguish the homotopy class of one link map from another.
△ Less
Submitted 19 October, 2009;
originally announced October 2009.
-
Derivatives of the identity and generalizations of Milnor's invariants
Authors:
Brian A. Munson
Abstract:
We synthesize work of U. Koschorke on link maps and work of B. Johnson on the derivatives of the identity functor in homotopy theory. The result can be viewed in two ways: (1) As a generalization of Koschorke's "higher Hopf invariants", which themselves can be viewed as a generalization of Milnor's invariants of link maps in Euclidean space; and (2) As a stable range description, in terms of bordi…
▽ More
We synthesize work of U. Koschorke on link maps and work of B. Johnson on the derivatives of the identity functor in homotopy theory. The result can be viewed in two ways: (1) As a generalization of Koschorke's "higher Hopf invariants", which themselves can be viewed as a generalization of Milnor's invariants of link maps in Euclidean space; and (2) As a stable range description, in terms of bordism, of the cross effects of the identity functor in homotopy theory evaluated at spheres. We also show how our generalized Milnor invariants fit into the framework of a multivariable manifold calculus of functors, as developed by the author and Volić, which is itself a generalization of the single variable version due to Weiss and Goodwillie.
△ Less
Submitted 10 January, 2011; v1 submitted 16 September, 2009;
originally announced September 2009.
-
Cosimplicial models for spaces of links
Authors:
Brian A. Munson,
Ismar Volic
Abstract:
We study the spaces of string links and homotopy string links in an arbitrary manifold using multivariable manifold calculus of functors. We construct multi-cosimplicial models for both spaces and deduce certain convergence properties of the associated Bousfield-Kan homotopy and cohomology spectral sequences when the ambient manifold is a Euclidean space of dimension four or more.
We study the spaces of string links and homotopy string links in an arbitrary manifold using multivariable manifold calculus of functors. We construct multi-cosimplicial models for both spaces and deduce certain convergence properties of the associated Bousfield-Kan homotopy and cohomology spectral sequences when the ambient manifold is a Euclidean space of dimension four or more.
△ Less
Submitted 3 November, 2009; v1 submitted 14 June, 2009;
originally announced June 2009.
-
Multivariable manifold calculus of functors
Authors:
Brian A. Munson,
Ismar Volic
Abstract:
Manifold calculus of functors, due to M. Weiss, studies contravariant functors from the poset of open subsets of a smooth manifold to topological spaces. We introduce "multivariable" manifold calculus of functors which is a generalization of this theory to functors whose domain is a product of categories of open sets. We construct multivariable Taylor approximations to such functors, classify mult…
▽ More
Manifold calculus of functors, due to M. Weiss, studies contravariant functors from the poset of open subsets of a smooth manifold to topological spaces. We introduce "multivariable" manifold calculus of functors which is a generalization of this theory to functors whose domain is a product of categories of open sets. We construct multivariable Taylor approximations to such functors, classify multivariable homogeneous functors, apply this classification to compute the derivatives of a functor, and show what this gives for the space of link maps. We also relate Taylor approximations in single variable calculus to our multivariable ones.
△ Less
Submitted 10 September, 2010; v1 submitted 27 April, 2009;
originally announced April 2009.
-
Embeddings in the 3/4 range
Authors:
Brian A. Munson
Abstract:
We give a complete obstruction to turning an immersion of an m-dimensional manifold M in Euclidean n-space into an embedding when 3n>4m+4. It is a secondary obstruction, and exists only when the primary obstruction, due to Haefliger, vanishes. The obstruction lives in a twisted cobordism group, and its vanishing implies the existence of an embedding in the regular homotopy class of the given imm…
▽ More
We give a complete obstruction to turning an immersion of an m-dimensional manifold M in Euclidean n-space into an embedding when 3n>4m+4. It is a secondary obstruction, and exists only when the primary obstruction, due to Haefliger, vanishes. The obstruction lives in a twisted cobordism group, and its vanishing implies the existence of an embedding in the regular homotopy class of the given immersion in the range indicated. We use Goodwillie's calculus of functors, following Weiss, to help organize and prove the result.
△ Less
Submitted 1 November, 2004; v1 submitted 24 November, 2003;
originally announced November 2003.