-
Possible Causes of False General Relativity Violations in Gravitational Wave Observations
Authors:
Anuradha Gupta,
K. G. Arun,
Enrico Barausse,
Laura Bernard,
Emanuele Berti,
Sajad A. Bhat,
Alessandra Buonanno,
Vitor Cardoso,
Shun Yin Cheung,
Teagan A. Clarke,
Sayantani Datta,
Arnab Dhani,
Jose María Ezquiaga,
Ish Gupta,
Nir Guttman,
Tanja Hinderer,
Qian Hu,
Justin Janquart,
Nathan K. Johnson-McDaniel,
Rahul Kashyap,
N. V. Krishnendu,
Paul D. Lasky,
Andrew Lundgren,
Elisa Maggio,
Parthapratim Mahapatra
, et al. (18 additional authors not shown)
Abstract:
General relativity (GR) has proven to be a highly successful theory of gravity since its inception. The theory has thrivingly passed numerous experimental tests, predominantly in weak gravity, low relative speeds, and linear regimes, but also in the strong-field and very low-speed regimes with binary pulsars. Observable gravitational waves (GWs) originate from regions of spacetime where gravity is…
▽ More
General relativity (GR) has proven to be a highly successful theory of gravity since its inception. The theory has thrivingly passed numerous experimental tests, predominantly in weak gravity, low relative speeds, and linear regimes, but also in the strong-field and very low-speed regimes with binary pulsars. Observable gravitational waves (GWs) originate from regions of spacetime where gravity is extremely strong, making them a unique tool for testing GR, in previously inaccessible regions of large curvature, relativistic speeds, and strong gravity. Since their first detection, GWs have been extensively used to test GR, but no deviations have been found so far. Given GR's tremendous success in explaining current astronomical observations and laboratory experiments, accepting any deviation from it requires a very high level of statistical confidence and consistency of the deviation across GW sources. In this paper, we compile a comprehensive list of potential causes that can lead to a false identification of a GR violation in standard tests of GR on data from current and future ground-based GW detectors. These causes include detector noise, signal overlaps, gaps in the data, detector calibration, source model inaccuracy, missing physics in the source and in the underlying environment model, source misidentification, and mismodeling of the astrophysical population. We also provide a rough estimate of when each of these causes will become important for tests of GR for different detector sensitivities. We argue that each of these causes should be thoroughly investigated, quantified, and ruled out before claiming a GR violation in GW observations.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Beyond Joint Demonstrations: Personalized Expert Guidance for Efficient Multi-Agent Reinforcement Learning
Authors:
Peihong Yu,
Manav Mishra,
Alec Koppel,
Carl Busart,
Priya Narayan,
Dinesh Manocha,
Amrit Bedi,
Pratap Tokekar
Abstract:
Multi-Agent Reinforcement Learning (MARL) algorithms face the challenge of efficient exploration due to the exponential increase in the size of the joint state-action space. While demonstration-guided learning has proven beneficial in single-agent settings, its direct applicability to MARL is hindered by the practical difficulty of obtaining joint expert demonstrations. In this work, we introduce…
▽ More
Multi-Agent Reinforcement Learning (MARL) algorithms face the challenge of efficient exploration due to the exponential increase in the size of the joint state-action space. While demonstration-guided learning has proven beneficial in single-agent settings, its direct applicability to MARL is hindered by the practical difficulty of obtaining joint expert demonstrations. In this work, we introduce a novel concept of personalized expert demonstrations, tailored for each individual agent or, more broadly, each individual type of agent within a heterogeneous team. These demonstrations solely pertain to single-agent behaviors and how each agent can achieve personal goals without encompassing any cooperative elements, thus naively imitating them will not achieve cooperation due to potential conflicts. To this end, we propose an approach that selectively utilizes personalized expert demonstrations as guidance and allows agents to learn to cooperate, namely personalized expert-guided MARL (PegMARL). This algorithm utilizes two discriminators: the first provides incentives based on the alignment of policy behavior with demonstrations, and the second regulates incentives based on whether the behavior leads to the desired objective. We evaluate PegMARL using personalized demonstrations in both discrete and continuous environments. The results demonstrate that PegMARL learns near-optimal policies even when provided with suboptimal demonstrations, and outperforms state-of-the-art MARL algorithms in solving coordinated tasks. We also showcase PegMARL's capability to leverage joint demonstrations in the StarCraft scenario and converge effectively even with demonstrations from non-co-trained policies.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Ultralight vector dark matter search using data from the KAGRA O3GK run
Authors:
The LIGO Scientific Collaboration,
the Virgo Collaboration,
the KAGRA Collaboration,
A. G. Abac,
R. Abbott,
H. Abe,
I. Abouelfettouh,
F. Acernese,
K. Ackley,
C. Adamcewicz,
S. Adhicary,
N. Adhikari,
R. X. Adhikari,
V. K. Adkins,
V. B. Adya,
C. Affeldt,
D. Agarwal,
M. Agathos,
O. D. Aguiar,
I. Aguilar,
L. Aiello,
A. Ain,
P. Ajith,
T. Akutsu,
S. Albanesi
, et al. (1778 additional authors not shown)
Abstract:
Among the various candidates for dark matter (DM), ultralight vector DM can be probed by laser interferometric gravitational wave detectors through the measurement of oscillating length changes in the arm cavities. In this context, KAGRA has a unique feature due to differing compositions of its mirrors, enhancing the signal of vector DM in the length change in the auxiliary channels. Here we prese…
▽ More
Among the various candidates for dark matter (DM), ultralight vector DM can be probed by laser interferometric gravitational wave detectors through the measurement of oscillating length changes in the arm cavities. In this context, KAGRA has a unique feature due to differing compositions of its mirrors, enhancing the signal of vector DM in the length change in the auxiliary channels. Here we present the result of a search for $U(1)_{B-L}$ gauge boson DM using the KAGRA data from auxiliary length channels during the first joint observation run together with GEO600. By applying our search pipeline, which takes into account the stochastic nature of ultralight DM, upper bounds on the coupling strength between the $U(1)_{B-L}$ gauge boson and ordinary matter are obtained for a range of DM masses. While our constraints are less stringent than those derived from previous experiments, this study demonstrates the applicability of our method to the lower-mass vector DM search, which is made difficult in this measurement by the short observation time compared to the auto-correlation time scale of DM.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
EIGEN: Expert-Informed Joint Learning Aggregation for High-Fidelity Information Extraction from Document Images
Authors:
Abhishek Singh,
Venkatapathy Subramanian,
Ayush Maheshwari,
Pradeep Narayan,
Devi Prasad Shetty,
Ganesh Ramakrishnan
Abstract:
Information Extraction (IE) from document images is challenging due to the high variability of layout formats. Deep models such as LayoutLM and BROS have been proposed to address this problem and have shown promising results. However, they still require a large amount of field-level annotations for training these models. Other approaches using rule-based methods have also been proposed based on th…
▽ More
Information Extraction (IE) from document images is challenging due to the high variability of layout formats. Deep models such as LayoutLM and BROS have been proposed to address this problem and have shown promising results. However, they still require a large amount of field-level annotations for training these models. Other approaches using rule-based methods have also been proposed based on the understanding of the layout and semantics of a form such as geometric position, or type of the fields, etc. In this work, we propose a novel approach, EIGEN (Expert-Informed Joint Learning aGgrEatioN), which combines rule-based methods with deep learning models using data programming approaches to circumvent the requirement of annotation of large amounts of training data. Specifically, EIGEN consolidates weak labels induced from multiple heuristics through generative models and use them along with a small number of annotated labels to jointly train a deep model. In our framework, we propose the use of labeling functions that include incorporating contextual information thus capturing the visual and language context of a word for accurate categorization. We empirically show that our EIGEN framework can significantly improve the performance of state-of-the-art deep models with the availability of very few labeled data instances. The source code is available at https://github.com/ayushayush591/EIGEN-High-Fidelity-Extraction-Document-Images.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
Shared Information for a Markov Chain on a Tree
Authors:
Sagnik Bhattacharya,
Prakash Narayan
Abstract:
Shared information is a measure of mutual dependence among multiple jointly distributed random variables with finite alphabets. For a Markov chain on a tree with a given joint distribution, we give a new proof of an explicit characterization of shared information. The Markov chain on a tree is shown to possess a global Markov property based on graph separation; this property plays a key role in ou…
▽ More
Shared information is a measure of mutual dependence among multiple jointly distributed random variables with finite alphabets. For a Markov chain on a tree with a given joint distribution, we give a new proof of an explicit characterization of shared information. The Markov chain on a tree is shown to possess a global Markov property based on graph separation; this property plays a key role in our proofs. When the underlying joint distribution is not known, we exploit the special form of this characterization to provide a multiarmed bandit algorithm for estimating shared information, and analyze its error performance.
△ Less
Submitted 21 January, 2024; v1 submitted 28 July, 2023;
originally announced July 2023.
-
List Privacy Under Function Recoverability
Authors:
Ajaykrishnan Nageswaran,
Prakash Narayan
Abstract:
For a given function of user data, a querier must recover with at least a prescribed probability, the value of the function based on a user-provided query response. Subject to this requirement, the user forms the query response so as to minimize the likelihood of the querier guessing a list of prescribed size to which the data value belongs based on the query response. We obtain a general converse…
▽ More
For a given function of user data, a querier must recover with at least a prescribed probability, the value of the function based on a user-provided query response. Subject to this requirement, the user forms the query response so as to minimize the likelihood of the querier guessing a list of prescribed size to which the data value belongs based on the query response. We obtain a general converse upper bound for maximum list privacy. This bound is shown to be tight for the case of a binary-valued function through an explicit achievability scheme that involves an add-noise query response.
△ Less
Submitted 3 July, 2024; v1 submitted 11 July, 2023;
originally announced July 2023.
-
Effect of Ignoring Eccentricity in Testing General Relativity with Gravitational Waves
Authors:
Purnima Narayan,
Nathan K. Johnson-McDaniel,
Anuradha Gupta
Abstract:
Detections of gravitational waves emitted from binary black hole coalescences allow us to probe the strong-field dynamics of general relativity (GR). One can compare the observed gravitational-wave signals with theoretical waveform models to constrain possible deviations from GR. Any physics that is not included in these waveform models might show up as apparent GR deviations. The waveform models…
▽ More
Detections of gravitational waves emitted from binary black hole coalescences allow us to probe the strong-field dynamics of general relativity (GR). One can compare the observed gravitational-wave signals with theoretical waveform models to constrain possible deviations from GR. Any physics that is not included in these waveform models might show up as apparent GR deviations. The waveform models used in current tests of GR describe binaries on quasicircular orbits, since most of the binaries detected by ground-based gravitational-wave detectors are expected to have negligible eccentricities. Thus, a signal from an eccentric binary in GR is likely to show up as a deviation from GR in the current implementation of these tests. We study the response of four standard tests of GR to eccentric binary black hole signals with the forecast O4 sensitivity of the LIGO-Virgo network. Specifically, we consider two parameterized tests (TIGER and FTI), the modified dispersion relation test, and the inspiral-merger-ringdown consistency test. To model eccentric signals, we use non-spinning numerical relativity simulations from the SXS catalog with three mass ratios $(1,2,3)$, which we scale to a redshifted total mass of $80M_\odot$ and luminosity distance of $400$ Mpc. For each of these mass ratios, we consider signals with eccentricities of $\sim0.05$ and $\sim 0.1$ at $17$ Hz. We find that signals with larger eccentricity lead to very significant false GR deviations in most tests while signals having smaller eccentricity lead to significant deviations in some tests. For the larger eccentricity cases, one would even get a deviation from GR with TIGER at $\sim 90\%$ credibility at a distance of $\gtrsim 1.5$ Gpc. Thus, it will be necessary to exclude the possibility of an eccentric binary in order to make any claim about detecting a deviation from GR.
△ Less
Submitted 29 August, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
-
Gravitational Edge Mode in Asymptotically AdS$_2$: JT Gravity Revisited
Authors:
Euihun Joung,
Prithvi Narayan,
Junggi Yoon
Abstract:
We study the gravitational edge mode of the Jackiw-Teitelboim (JT) gravity and its $sl(2,\mathbb{R})$ BF theory description with the asymptotic AdS$_2$ boundary condition. We revisit the derivation of the Schwarzian theory from the wiggling boundary as an action for the gravitational edge mode. We present an alternative description for the gravitational edge mode from the metric fluctuation with t…
▽ More
We study the gravitational edge mode of the Jackiw-Teitelboim (JT) gravity and its $sl(2,\mathbb{R})$ BF theory description with the asymptotic AdS$_2$ boundary condition. We revisit the derivation of the Schwarzian theory from the wiggling boundary as an action for the gravitational edge mode. We present an alternative description for the gravitational edge mode from the metric fluctuation with the fixed boundary, which is often referred as "would-be gauge mode". We clarify the relation between the wiggling boundary and the would-be gauge mode. We demonstrate a natural top-down derivation of $PSL(2,\mathbb{R})$ gauging and the path integral measure of the Schwarzian theory. In the $sl(2,\mathbb{R})$ BF theory, we incorporate the gravitational edge mode and derive the Schwarzian theory with $PSL(2,\mathbb{R})$ gauging. We also discuss the path integral measure from the Haar measure in the Iwasawa decomposition of $PSL(2,\mathbb{R})$.
△ Less
Submitted 8 March, 2024; v1 submitted 12 April, 2023;
originally announced April 2023.
-
SYK Model with global symmetries in the double scaling limit
Authors:
Prithvi Narayan,
Swathi T S
Abstract:
We discuss the double scaling limit of the SYK model with global symmetries. We develop the chord diagram techniques to compute the moments of the Hamiltonian and the two point function in the presence of arbitrary chemical potential. We also derive a transfer matrix acting on an auxiliary Hilbert space which can capture the chord diagram contributions. We present explicit results for the case of…
▽ More
We discuss the double scaling limit of the SYK model with global symmetries. We develop the chord diagram techniques to compute the moments of the Hamiltonian and the two point function in the presence of arbitrary chemical potential. We also derive a transfer matrix acting on an auxiliary Hilbert space which can capture the chord diagram contributions. We present explicit results for the case of classical group symmetries namely orthogonal, unitary and symplectic groups. We also find the partition functions at fixed charges.
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
Estimating entanglement in 2D Heisenberg model in the strong rung-coupling limit
Authors:
Chandrima B. Pushpan,
Harikrishnan K. J.,
Prithvi Narayan,
Amit Kumar Pal
Abstract:
In this paper, we calculate entanglement in the isotropic Heisenberg model in a magnetic field on a two-dimensional rectangular zig-zag lattice in the strong rung-coupling limit, using the one-dimensional XXZ model as a proxy. Focusing on the leading order in perturbation, for arbitrary size of the lattice, we show how the one-dimensional effective description emerges. We point out specific states…
▽ More
In this paper, we calculate entanglement in the isotropic Heisenberg model in a magnetic field on a two-dimensional rectangular zig-zag lattice in the strong rung-coupling limit, using the one-dimensional XXZ model as a proxy. Focusing on the leading order in perturbation, for arbitrary size of the lattice, we show how the one-dimensional effective description emerges. We point out specific states in the low-energy sector of the two-dimensional model that are well-approximated by the one-dimensional spin-1/2 XXZ model. We propose a systematic approach for map** matrix-elements of operators defined on the two-dimensional model to their low-energy counterparts on the one-dimensional XXZ model. We also show that partial trace-based description of entanglement in the two-dimensional model can be satisfactorily approximated using the one-dimensional XXZ model as a substitute. We further show numerically that the one-dimensional XXZ model performs well in estimating entanglement quantified using a measurement-based approach in the two-dimensional model for specific choices of measured Hermitian operators.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
Quantum groups, non-commutative $AdS_2$, and chords in the double-scaled SYK model
Authors:
Micha Berkooz,
Mikhail Isachenkov,
Prithvi Narayan,
Vladimir Narovlansky
Abstract:
We study the double-scaling limit of SYK (DS-SYK) model and elucidate the underlying quantum group symmetry. The DS-SYK model is characterized by a parameter $q$, and in the $q\rightarrow 1$ and low-energy limit it goes over to the familiar Schwarzian theory. We relate the chord and transfer-matrix picture to the motion of a ``boundary particle" on the Euclidean Poincar{é} disk, which underlies th…
▽ More
We study the double-scaling limit of SYK (DS-SYK) model and elucidate the underlying quantum group symmetry. The DS-SYK model is characterized by a parameter $q$, and in the $q\rightarrow 1$ and low-energy limit it goes over to the familiar Schwarzian theory. We relate the chord and transfer-matrix picture to the motion of a ``boundary particle" on the Euclidean Poincar{é} disk, which underlies the single-sided Schwarzian model. $AdS_2$ carries an action of $\mathfrak{s}\mathfrak{l}(2,{\mathbb R}) \simeq \mathfrak{s}\mathfrak{u}(1,1)$, and we argue that the symmetry of the full DS-SYK model is a certain $q$-deformation of the latter, namely $\mathcal{U}_{\sqrt q}(\mathfrak{s}\mathfrak{u}(1,1))$. We do this by obtaining the effective Hamiltonian of the DS-SYK as a (reduction of) particle moving on a lattice deformation of $AdS_2$, which has this $\mathcal{U}_{\sqrt q}(\mathfrak{s}\mathfrak{u}(1,1))$ algebra as its symmetry. We also exhibit the connection to non-commutative geometry of $q$-homogeneous spaces, by obtaining the effective Hamiltonian of the DS-SYK as a (reduction of) particle moving on a non-commutative deformation of $AdS_3$. There are families of possibly distinct $q$-deformed $AdS_2$ spaces, and we point out which are relevant for the DS-SYK model.
△ Less
Submitted 27 December, 2022;
originally announced December 2022.
-
Exactly Solvable 1D Quantum Models with Gamma Matrices
Authors:
Yash Chugh,
Kusum Dhochak,
Uma Divakaran,
Prithvi Narayan,
Amit Kumar Pal
Abstract:
In this paper, we write exactly solvable generalizations of 1-dimensional quantum XY and Ising-like models by using $2^d$-dimensional Gamma ($Γ$) matrices as the degrees of freedom on each site. We show that these models result in quadratic Fermionic Hamiltonians with Jordan-Wigner like transformations. We illustrate the techniques using a specific case of 4-dimensional $Γ$ matrices and explore th…
▽ More
In this paper, we write exactly solvable generalizations of 1-dimensional quantum XY and Ising-like models by using $2^d$-dimensional Gamma ($Γ$) matrices as the degrees of freedom on each site. We show that these models result in quadratic Fermionic Hamiltonians with Jordan-Wigner like transformations. We illustrate the techniques using a specific case of 4-dimensional $Γ$ matrices and explore the quantum phase transitions present in the model.
△ Less
Submitted 17 January, 2022;
originally announced January 2022.
-
Structural Breaks in Interactive Effects Panels and the Stock Market Reaction to COVID-19
Authors:
Yiannis Karavias,
Paresh Narayan,
Joakim Westerlund
Abstract:
Dealing with structural breaks is an important step in most, if not all, empirical economic research. This is particularly true in panel data comprised of many cross-sectional units, such as individuals, firms or countries, which are all affected by major events. The COVID-19 pandemic has affected most sectors of the global economy, and there is by now plenty of evidence to support this. The impac…
▽ More
Dealing with structural breaks is an important step in most, if not all, empirical economic research. This is particularly true in panel data comprised of many cross-sectional units, such as individuals, firms or countries, which are all affected by major events. The COVID-19 pandemic has affected most sectors of the global economy, and there is by now plenty of evidence to support this. The impact on stock markets is, however, still unclear. The fact that most markets seem to have partly recovered while the pandemic is still ongoing suggests that the relationship between stock returns and COVID-19 has been subject to structural change. It is therefore important to know if a structural break has occurred and, if it has, to infer the date of the break. In the present paper we take this last observation as a source of motivation to develop a new break detection toolbox that is applicable to different sized panels, easy to implement and robust to general forms of unobserved heterogeneity. The toolbox, which is the first of its kind, includes a test for structural change, a break date estimator, and a break date confidence interval. Application to a panel covering 61 countries from January 3 to September 25, 2020, leads to the detection of a structural break that is dated to the first week of April. The effect of COVID-19 is negative before the break and zero thereafter, implying that while markets did react, the reaction was short-lived. A possible explanation for this is the quantitative easing programs announced by central banks all over the world in the second half of March.
△ Less
Submitted 4 November, 2021;
originally announced November 2021.
-
Distribution Privacy Under Function Recoverability
Authors:
Ajaykrishnan Nageswaran,
Prakash Narayan
Abstract:
A user generates n independent and identically distributed data random variables with a probability mass function that must be guarded from a querier. The querier must recover, with a prescribed accuracy, a given function of the data from each of n independent and identically distributed query responses upon eliciting them from the user. The user chooses the data probability mass function and devi…
▽ More
A user generates n independent and identically distributed data random variables with a probability mass function that must be guarded from a querier. The querier must recover, with a prescribed accuracy, a given function of the data from each of n independent and identically distributed query responses upon eliciting them from the user. The user chooses the data probability mass function and devises the random query responses to maximize distribution privacy as gauged by the (Kullback-Leibler) divergence between the former and the querier's best estimate of it based on the n query responses. Considering an arbitrary function, a basic achievable lower bound for distribution privacy is provided that does not depend on n and corresponds to worst-case privacy. Worst-case privacy equals the logsum cardinalities of inverse atoms under the given function, with the number of summands decreasing as the querier recovers the function with improving accuracy. Next, upper (converse) and lower (achievability) bounds for distribution privacy, dependent on n, are developed. The former improves upon worst-case privacy and the latter does so under suitable assumptions; both converge to it as n grows. The converse and achievability proofs identify explicit strategies for the user and the querier.
△ Less
Submitted 30 December, 2021; v1 submitted 14 March, 2021;
originally announced March 2021.
-
Relating the curvature of De Sitter Universe to Open Quantum Lamb Shift Spectroscopy
Authors:
Hardik Bohra,
Sayantan Choudhury,
Prashali Chauhan,
Purnima Narayan,
Sudhakar Panda,
Abinash Swain
Abstract:
In this paper, we explore the connection between the curvature of the background De Sitter space-time with the spectroscopic study of entanglement of two atoms. Our set up is in the context of an Open Quantum System (OQS), where the two atoms, each having two energy levels and represented by Pauli spin tensor operators projected along any arbitrary direction. The system mimics the role of a pair o…
▽ More
In this paper, we explore the connection between the curvature of the background De Sitter space-time with the spectroscopic study of entanglement of two atoms. Our set up is in the context of an Open Quantum System (OQS), where the two atoms, each having two energy levels and represented by Pauli spin tensor operators projected along any arbitrary direction. The system mimics the role of a pair of freely falling Unruh De-Witt detectors, which are allowed to non-adiabatically interact with a conformally coupled massless probe scalar field which has the role of background thermal bath. The effective dynamics of this combined system takes into account of the non-adiabatic interaction, which is commonly known as the Resonant Casimir Polder Interaction (RCPI) with the thermal bath. Our analysis reveals that the RCPI of two stable entangled atoms in the quantum vacuum states in OQS depends on the de Sitter space-time curvature relevant to the temperature of the thermal bath felt by the static observer. We also find that, in OQS, RCPI produces a new significant contribution appearing in the effective Hamiltonian of the total system and thermal bath under consideration. We find that the Lamb Shift is characterized by a decreasing inverse square power-law behavior, $L^{-2}$, when inter atomic Euclidean distance, $L$, is much larger than a characteristic length scale, $k$, which is the inverse surface gravity of the background De Sitter space. If the background space-time would have been Minkowskian this shift decreases as, $L^{-1}$, and is independent of temperature. Thus, we establish a connection between the curvature of the De Sitter space-time with the Lamb Shift spectroscopy.
△ Less
Submitted 15 February, 2021; v1 submitted 20 May, 2019;
originally announced May 2019.
-
Chaos in Three-dimensional Higher Spin Gravity
Authors:
Prithvi Narayan,
Junggi Yoon
Abstract:
We discuss $SL(N,\mathbb{C})$ Chern-Simons higher spin gauge theories in Euclidean AdS$_3$. With appropriate boundary term, we derive the higher spin generalization of Schwarzian on-shell action. We investigate gravitationally dressed bi-locals, and we study the soft higher spin mode expansion to obtain soft mode eigenfunctions. We also derive the spin-$s$ eigenfunction from $\mathcal{W}$-Ward ide…
▽ More
We discuss $SL(N,\mathbb{C})$ Chern-Simons higher spin gauge theories in Euclidean AdS$_3$. With appropriate boundary term, we derive the higher spin generalization of Schwarzian on-shell action. We investigate gravitationally dressed bi-locals, and we study the soft higher spin mode expansion to obtain soft mode eigenfunctions. We also derive the spin-$s$ eigenfunction from $\mathcal{W}$-Ward identity and a recursion relation. Using the on-shell action, we evaluate the contributions of the soft higher spin modes to the out-of-time-order correlators, and the corresponding Lyapunov exponent of $SL(N)$ higher spin gravity is found to be ${2π\over β}(N-1)$.
△ Less
Submitted 10 June, 2019; v1 submitted 20 March, 2019;
originally announced March 2019.
-
Chord diagrams, exact correlators in spin glasses and black hole bulk reconstruction
Authors:
Micha Berkooz,
Prithvi Narayan,
Joan Simon
Abstract:
The exact 2-point function of certain physically motivated operators in SYK-like spin glass models is computed, bypassing the Schwinger-Dyson equations. The models possess an IR low energy conformal window, but our results are exact at all time scales. The main tool developed is a new approach to the combinatorics of chord diagrams, allowing to rewrite the spin glass system using an auxiliary Hilb…
▽ More
The exact 2-point function of certain physically motivated operators in SYK-like spin glass models is computed, bypassing the Schwinger-Dyson equations. The models possess an IR low energy conformal window, but our results are exact at all time scales. The main tool developed is a new approach to the combinatorics of chord diagrams, allowing to rewrite the spin glass system using an auxiliary Hilbert space, and Hamiltonian, built on the space of open chord diagrams. We argue the latter can be interpreted as the bulk description and that it reduces to the Schwarzian action in the low energy limit.
△ Less
Submitted 12 June, 2018;
originally announced June 2018.
-
Data Privacy for a $ρ$-Recoverable Function
Authors:
Ajaykrishnan Nageswaran,
Prakash Narayan
Abstract:
A user's data is represented by a finite-valued random variable. Given a function of the data, a querier is required to recover, with at least a prescribed probability, the value of the function based on a query response provided by the user. The user devises the query response, subject to the recoverability requirement, so as to maximize privacy of the data from the querier. Privacy is measured b…
▽ More
A user's data is represented by a finite-valued random variable. Given a function of the data, a querier is required to recover, with at least a prescribed probability, the value of the function based on a query response provided by the user. The user devises the query response, subject to the recoverability requirement, so as to maximize privacy of the data from the querier. Privacy is measured by the probability of error incurred by the querier in estimating the data from the query response. We analyze single and multiple independent query responses, with each response satisfying the recoverability requirement, that provide maximum privacy to the user. In the former setting, we also consider privacy for a predicate of the user's data. Achievability schemes with explicit randomization mechanisms for query responses are given and their privacy compared with converse upper bounds.
△ Less
Submitted 10 January, 2019; v1 submitted 21 February, 2018;
originally announced February 2018.
-
Schwinger-Keldysh superspace in quantum mechanics
Authors:
Michael Geracie,
Felix M. Haehl,
R. Loganayagam,
Prithvi Narayan,
David M. Ramirez,
Mukund Rangamani
Abstract:
We examine, in a quantum mechanical setting, the Hilbert space representation of the BRST symmetry associated with Schwinger-Keldysh path integrals. This structure had been postulated to encode important constraints on influence functionals in coarse-grained systems with dissipation, or in open quantum systems. Operationally, this entails uplifting the standard Schwinger-Keldysh two-copy formalism…
▽ More
We examine, in a quantum mechanical setting, the Hilbert space representation of the BRST symmetry associated with Schwinger-Keldysh path integrals. This structure had been postulated to encode important constraints on influence functionals in coarse-grained systems with dissipation, or in open quantum systems. Operationally, this entails uplifting the standard Schwinger-Keldysh two-copy formalism into superspace by appending BRST ghost degrees of freedom. These statements were previously argued at the level of the correlation functions. We provide herein a complementary perspective by working out the Hilbert space structure explicitly. Our analysis clarifies two crucial issues not evident in earlier works: firstly, certain background ghost insertions necessary to reproduce the correct Schwinger-Keldysh correlators arise naturally. Secondly, the Schwinger-Keldysh difference operators are systematically dressed by the ghost bilinears, which turn out to be necessary to give rise to a consistent operator algebra. We also elaborate on the structure of the final state (which is BRST closed) and the future boundary condition of the ghost fields.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
Supersymmetric SYK Model with Global Symmetry
Authors:
Prithvi Narayan,
Junggi Yoon
Abstract:
In this paper, we introduce an $\mathcal{N}=1$ supersymmetric SYK model with $SO(q)$ global symmetry. We study the large $N$ expansion of the bi-local collective action of our model. At strong coupling limit, this model exhibits a super-reparametrization symmetry, and the $SO(q)$ global symmetry is enhanced to a $\widehat{SO}(q)$ local symmetry. The corresponding symmetry algebra is the semi-direc…
▽ More
In this paper, we introduce an $\mathcal{N}=1$ supersymmetric SYK model with $SO(q)$ global symmetry. We study the large $N$ expansion of the bi-local collective action of our model. At strong coupling limit, this model exhibits a super-reparametrization symmetry, and the $SO(q)$ global symmetry is enhanced to a $\widehat{SO}(q)$ local symmetry. The corresponding symmetry algebra is the semi-direct product of the super-Virasoro and the super-Kac-Moody algebras. These emergent symmetries are spontaneously and explicitly broken, which leads to a low energy effective action: super-Schwarzian action plus an action of a super-particle on the $SO(q)$ group manifold. We analyze the zero mode contributions to the chaotic behavior of four point functions in various $SO(q)$ channels. In singlet channel, we show that the out-of-time-ordered correlators related to bosonic bi-locals exhibit the saturation of the chaos bound as in the non-SUSY SYK model. On the other hand, we find that the ones with fermionic bi-locals in the singlet channel have ${π\overβ}$ Lyapunov exponent. In the anti-symmetric channel, we demonstrate that the out-of-time-ordered correlator related to a $SO(q)$ generator grows linearly in time. We also compute the non-zero mode contributions which give consistent corrections to the leading Lyapunov exponents from the zero modes.
△ Less
Submitted 7 December, 2017;
originally announced December 2017.
-
On Exponentially Suppressed Corrections to BMPV Black Hole Entropy
Authors:
Shailesh Lal,
Prithvi Narayan
Abstract:
The microscopic formula for the degeneracy of BMPV black hole microstates contains a series of exponentially suppressed corrections to the leading Bekenstein Hawking expression. We identify saddle points of the quantum entropy function for the BMPV black hole which are natural counterparts to these corrections and discuss the matching of leading and next-to-leading terms from the microscopic and m…
▽ More
The microscopic formula for the degeneracy of BMPV black hole microstates contains a series of exponentially suppressed corrections to the leading Bekenstein Hawking expression. We identify saddle points of the quantum entropy function for the BMPV black hole which are natural counterparts to these corrections and discuss the matching of leading and next-to-leading terms from the microscopic and macroscopic sides in a limit where the black hole charges are large.
△ Less
Submitted 30 October, 2017;
originally announced October 2017.
-
Premature Unilateral Ripening in Euonymus alatus: Two Hits Leave(s) a Red Face
Authors:
Rithika Narayan,
Prakash Narayan
Abstract:
An empirical 2-hit hypothesis is presented to account for premature and unilateral ripening in Euonymus alatus.
An empirical 2-hit hypothesis is presented to account for premature and unilateral ripening in Euonymus alatus.
△ Less
Submitted 12 October, 2017;
originally announced October 2017.
-
A Circulating Biomarker-based Framework for Diagnosis of Hepatocellular Carcinoma in a Clinically Relevant Model of Non-alcoholic Steatohepatitis; An OAD to NASH
Authors:
** Zhou,
Anne Hwang,
Christopher Shi,
Edward Zhu,
Farha Naaz,
Zainab Rasheed,
Michelle Liu,
Lindsey S. Jung,
**gsong Li,
Kai Jiang,
Latha Paka,
Michael A. Yamin,
Itzhak D. Goldberg,
Prakash Narayan
Abstract:
Although cirrhosis is a key risk factor for the development of hepatocellular carcinoma (HCC), mounting evidence indicates that in a subset of patients presenting with non-alcoholic steatohepatitis (NASH), HCC manifests in the absence of cirrhosis. Given the sheer size of the non-alcoholic fatty liver disease (NAFLD) epidemic, and the dismal prognosis associated with late-stage primary liver cance…
▽ More
Although cirrhosis is a key risk factor for the development of hepatocellular carcinoma (HCC), mounting evidence indicates that in a subset of patients presenting with non-alcoholic steatohepatitis (NASH), HCC manifests in the absence of cirrhosis. Given the sheer size of the non-alcoholic fatty liver disease (NAFLD) epidemic, and the dismal prognosis associated with late-stage primary liver cancer, there is an urgent need for HCC surveillance in the NASH patient. In the present study, adult male mice randomized to control diet or a fast food diet (FFD) were followed for up to 14 mo and serum level of a panel of HCC-relevant biomarkers was compared with liver biopsies at 3 and 14 mo. Both NAFLD Activity Score (NAS) and hepatic hydroxyproline content were elevated at 3 and 14 mo on FFD. Picrosirius red staining of liver sections revealed a filigree pattern of fibrillar collagen deposition with no cirrhosis at 14 mo on FFD. Nevertheless, 46% of animals bore one or more tumors on their livers confirmed as HCC in hematoxylin-eosin-stained liver sections. Receiver operating characteristic (ROC) curves analysis for serum levels of the HCC biomarkers osteopontin (OPN), alpha-fetoprotein (AFP) and Dickkopf-1 (DKK1) returned concordance-statistic/area under ROC curve of > 0.89. These data suggest that serum levels of OPN (threshold, 218 ng/mL; sensitivity, 82%; specificity, 86%), AFP (136 ng/mL; 91%; 97%) and DKK1 (2.4 ng/mL; 82%; 81%) are diagnostic for HCC in a clinically relevant model of NASH
△ Less
Submitted 19 November, 2017; v1 submitted 2 October, 2017;
originally announced October 2017.
-
Thermal out-of-time-order correlators, KMS relations, and spectral functions
Authors:
Felix M. Haehl,
R. Loganayagam,
Prithvi Narayan,
Amin A. Nizami,
Mukund Rangamani
Abstract:
We describe general features of thermal correlation functions in quantum systems, with specific focus on the fluctuation-dissipation type relations implied by the KMS condition. These end up relating correlation functions with different time ordering and thus should naturally be viewed in the larger context of out-of-time-ordered (OTO) observables. In particular, eschewing the standard formulation…
▽ More
We describe general features of thermal correlation functions in quantum systems, with specific focus on the fluctuation-dissipation type relations implied by the KMS condition. These end up relating correlation functions with different time ordering and thus should naturally be viewed in the larger context of out-of-time-ordered (OTO) observables. In particular, eschewing the standard formulation of KMS relations where thermal periodicity is combined with time-reversal to stay within the purview of Schwinger-Keldysh functional integrals, we show that there is a natural way to phrase them directly in terms of OTO correlators. We use these observations to construct a natural causal basis for thermal n-point functions in terms of fully nested commutators. We provide several general results which can be inferred from cyclic orbits of permutations, and exemplify the abstract results using a quantum oscillator as an explicit example.
△ Less
Submitted 31 December, 2017; v1 submitted 27 June, 2017;
originally announced June 2017.
-
Universal Sampling Rate Distortion
Authors:
Vinay Praneeth Boda,
Prakash Narayan
Abstract:
We examine the coordinated and universal rate-efficient sampling of a subset of correlated discrete memoryless sources followed by lossy compression of the sampled sources. The goal is to reconstruct a predesignated subset of sources within a specified level of distortion. The combined sampling mechanism and rate distortion code are universal in that they are devised to perform robustly without ex…
▽ More
We examine the coordinated and universal rate-efficient sampling of a subset of correlated discrete memoryless sources followed by lossy compression of the sampled sources. The goal is to reconstruct a predesignated subset of sources within a specified level of distortion. The combined sampling mechanism and rate distortion code are universal in that they are devised to perform robustly without exact knowledge of the underlying joint probability distribution of the sources. In Bayesian as well as nonBayesian settings, single-letter characterizations are provided for the universal sampling rate distortion function for fixed-set sampling, independent random sampling and memoryless random sampling. It is illustrated how these sampling mechanisms are successively better. Our achievability proofs bring forth new schemes for joint source distribution-learning and lossy compression.
△ Less
Submitted 22 June, 2017;
originally announced June 2017.
-
SYK-like Tensor Models on the Lattice
Authors:
Prithvi Narayan,
Junggi Yoon
Abstract:
We study large $N$ tensor models on the lattice without disorder. We introduce techniques which can be applied to a wide class of models, and illustrate it by studying some specific rank-3 tensor models. In particular, we study Klebanov-Tarnopolsky model on lattice, Gurau-Witten model (by treating it as a tensor model on four sites) and also a new model which interpolates between these two models.…
▽ More
We study large $N$ tensor models on the lattice without disorder. We introduce techniques which can be applied to a wide class of models, and illustrate it by studying some specific rank-3 tensor models. In particular, we study Klebanov-Tarnopolsky model on lattice, Gurau-Witten model (by treating it as a tensor model on four sites) and also a new model which interpolates between these two models. In each model, we evaluate various four point functions at large $N$ and strong coupling, and discuss their spectrum and long time behaviors. We find similarities as well as differences from SYK model. We also generalize our analysis to rank-$D$ tensor models where we obtain analogous results as $D=3$ case for the four point functions which we computed. For $D>5$, we are able to compute the next-to-subleading ${1 \over N}$ corrections for a specific four point function.
△ Less
Submitted 11 July, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
Comments on the Random Thirring Model
Authors:
Micha Berkooz,
Prithvi Narayan,
Moshe Rozali,
Joan Simón
Abstract:
The Thirring model with random couplings is a translationally invariant generalisation of the SYK model to 1+1 dimensions, which is tractable in the large N limit. We compute its two point function, at large distances, for any strength of the random coupling. For a given realisation, the couplings contain both irrelevant and relevant marginal operators, but statistically, in the large N limit, the…
▽ More
The Thirring model with random couplings is a translationally invariant generalisation of the SYK model to 1+1 dimensions, which is tractable in the large N limit. We compute its two point function, at large distances, for any strength of the random coupling. For a given realisation, the couplings contain both irrelevant and relevant marginal operators, but statistically, in the large N limit, the random couplings are overall always marginally irrelevant, in sharp distinction to the usual Thirring model. We show the leading term to the $β$ function in conformal perturbation theory, which is quadratic in the couplings, vanishes, while its usually subleading cubic term matches our RG flow.
△ Less
Submitted 21 March, 2017; v1 submitted 16 February, 2017;
originally announced February 2017.
-
Classification of out-of-time-order correlators
Authors:
Felix M. Haehl,
R. Loganayagam,
Prithvi Narayan,
Mukund Rangamani
Abstract:
The space of n-point correlation functions, for all possible time-orderings of operators, can be computed by a non-trivial path integral contour, which depends on how many time-ordering violations are present in the correlator. These contours, which have come to be known as timefolds, or out-of-time-order (OTO) contours, are a natural generalization of the Schwinger-Keldysh contour (which computes…
▽ More
The space of n-point correlation functions, for all possible time-orderings of operators, can be computed by a non-trivial path integral contour, which depends on how many time-ordering violations are present in the correlator. These contours, which have come to be known as timefolds, or out-of-time-order (OTO) contours, are a natural generalization of the Schwinger-Keldysh contour (which computes singly out-of-time-ordered correlation functions). We provide a detailed discussion of such higher OTO functional integrals, explaining their general structure, and the myriad ways in which a particular correlation function may be encoded in such contours. Our discussion may be seen as a natural generalization of the Schwinger-Keldysh formalism to higher OTO correlation functions. We provide explicit illustration for low point correlators (n=2,3,4) to exemplify the general statements.
△ Less
Submitted 9 December, 2018; v1 submitted 10 January, 2017;
originally announced January 2017.
-
Renal Parenchymal Area and Kidney Collagen Content
Authors:
Jake A. Nieto,
Janice Zhu,
Bin Duan,
**gsong Li,
** Zhou,
Latha Paka,
Michael A. Yamin,
Itzhak D. Goldberg,
Prakash Narayan
Abstract:
The extent of renal scarring in chronic kidney disease (CKD) can only be ascertained by highly invasive, painful and sometimes risky tissue biopsy. Interestingly, CKD-related abnormalities in kidney size can often be visualized using ultrasound. Nevertheless, not only does the ellipsoid formula used today underestimate true renal size but also the relation governing renal size and collagen content…
▽ More
The extent of renal scarring in chronic kidney disease (CKD) can only be ascertained by highly invasive, painful and sometimes risky tissue biopsy. Interestingly, CKD-related abnormalities in kidney size can often be visualized using ultrasound. Nevertheless, not only does the ellipsoid formula used today underestimate true renal size but also the relation governing renal size and collagen content remains unclear. We used coronal kidney sections from healthy mice and mice with renal disease to develop a new technique for estimating the renal parenchymal area. While treating the kidney as an ellipse with the major axis the polar distance, this technique involves extending the minor axis into the renal pelvis. The calculated renal parenchymal area is remarkably similar to the measured area. Biochemically determined kidney collagen content revealed a strong and positive correlation with the calculated renal parenchymal area. The extent of renal scarring, i.e. kidney collagen content, can now be computed by making just two renal axial measurements which can easily be accomplished via noninvasive imaging of this organ.
△ Less
Submitted 10 November, 2016; v1 submitted 7 November, 2016;
originally announced November 2016.
-
Higher Dimensional Generalizations of the SYK Model
Authors:
Micha Berkooz,
Prithvi Narayan,
Moshe Rozali,
Joan Simón
Abstract:
We discuss a 1+1 dimensional generalization of the Sachdev-Ye-Kitaev model. The model contains $N$ Majorana fermions at each lattice site with a nearest-neighbour hop** term. The SYK random interaction is restricted to low momentum fermions of definite chirality within each lattice site. This gives rise to an ordinary 1+1 field theory above some energy scale and a low energy SYK-like behavior. W…
▽ More
We discuss a 1+1 dimensional generalization of the Sachdev-Ye-Kitaev model. The model contains $N$ Majorana fermions at each lattice site with a nearest-neighbour hop** term. The SYK random interaction is restricted to low momentum fermions of definite chirality within each lattice site. This gives rise to an ordinary 1+1 field theory above some energy scale and a low energy SYK-like behavior. We exhibit a class of low-pass filters which give rise to a rich variety of hyperscaling behaviour in the IR. We also discuss another set of generalizations which describes probing an SYK system with an external fermion, together with the new scaling behavior they exhibit in the IR.
△ Less
Submitted 21 November, 2016; v1 submitted 7 October, 2016;
originally announced October 2016.
-
An Empirical Biomarker-based Calculator for Autosomal Recessive Polycystic Kidney Disease - The Nieto-Narayan Formula
Authors:
Jake A. Nieto,
Michael A. Yamin,
Itzhak D. Goldberg,
Prakash Narayan
Abstract:
Autosomal polycystic kidney disease (ARPKD) is associated with progressive enlargement of the kidneys fuelled by the formation and expansion of fluid-filled cysts. The disease is congenital and children that do not succumb to it during the neonatal period will, by age 10 years, more often than not, require nephrectomy+renal replacement therapy for management of both pain and renal insufficiency. S…
▽ More
Autosomal polycystic kidney disease (ARPKD) is associated with progressive enlargement of the kidneys fuelled by the formation and expansion of fluid-filled cysts. The disease is congenital and children that do not succumb to it during the neonatal period will, by age 10 years, more often than not, require nephrectomy+renal replacement therapy for management of both pain and renal insufficiency. Since increasing cystic index (CI; percent of kidney occupied by cysts) drives both renal expansion and organ dysfunction, management of these patients, including decisions such as elective nephrectomy and prioritization on the transplant waitlist, could clearly benefit from serial determination of CI. So also, clinical trials in ARPKD evaluating the efficacy of novel drug candidates could benefit from serial determination of CI. Although ultrasound is currently the imaging modality of choice for diagnosis of ARPKD, its utilization for assessing disease progression is highly limited. Magnetic resonance imaging or computed tomography, although more reliable for determination of CI, are expensive, time-consuming and somewhat impractical in the pediatric population. Using a well-established mammalian model of ARPKD, we undertook a big data-like analysis of minimally- or non-invasive serum and urine biomarkers of renal injury/dysfunction to derive a family of equations for estimating CI. We then applied a signal averaging protocol to distill these equations to a single empirical formula for calculation of CI. Such a formula will eventually find use in identifying and monitoring patients at high risk for progressing to end-stage renal disease and aid in the conduct of clinical trials.
△ Less
Submitted 26 July, 2016; v1 submitted 25 July, 2016;
originally announced July 2016.
-
Sampling Rate Distortion
Authors:
Vinay Praneeth Boda,
Prakash Narayan
Abstract:
Consider a discrete memoryless multiple source with $m$ components of which $k \leq m$ possibly different sources are sampled at each time instant and jointly compressed in order to reconstruct all the $m$ sources under a given distortion criterion. A new notion of sampling rate distortion function is introduced, and is characterized first for the case of fixed-set sampling. Next, for independent…
▽ More
Consider a discrete memoryless multiple source with $m$ components of which $k \leq m$ possibly different sources are sampled at each time instant and jointly compressed in order to reconstruct all the $m$ sources under a given distortion criterion. A new notion of sampling rate distortion function is introduced, and is characterized first for the case of fixed-set sampling. Next, for independent random sampling performed without knowledge of the source outputs, it is shown that the sampling rate distortion function is the same regardless of whether or not the decoder is informed of the sequence of sampled sets. Furthermore, memoryless random sampling is considered with the sampler depending on the source outputs and with an informed decoder. It is shown that deterministic sampling, characterized by a conditional point-mass, is optimal and suffices to achieve the sampling rate distortion function. For memoryless random sampling with an uninformed decoder, an upper bound for the sampling rate distortion function is seen to possess a similar property of conditional point-mass optimality. It is shown by example that memoryless sampling with an informed decoder can outperform strictly any independent random sampler, and that memoryless sampling can do strictly better with an informed decoder than without.
△ Less
Submitted 14 July, 2016;
originally announced July 2016.
-
YTrace: End-to-end Performance Diagnosis in Large Cloud and Content Providers
Authors:
Partha Kanuparthy,
Yuchen Dai,
Sudhir Pathak,
Sambit Samal,
Theophilus Benson,
Mojgan Ghasemi,
P. P. S. Narayan
Abstract:
Content providers build serving stacks to deliver content to users. An important goal of a content provider is to ensure good user experience, since user experience has an impact on revenue. In this paper, we describe a system at Yahoo called YTrace that diagnoses bad user experience in near real time. We present the different components of YTrace for end-to-end multi-layer diagnosis (instrumentat…
▽ More
Content providers build serving stacks to deliver content to users. An important goal of a content provider is to ensure good user experience, since user experience has an impact on revenue. In this paper, we describe a system at Yahoo called YTrace that diagnoses bad user experience in near real time. We present the different components of YTrace for end-to-end multi-layer diagnosis (instrumentation, methods and backend system), and the system architecture for delivering diagnosis in near real time across all user sessions at Yahoo. YTrace diagnoses problems across service and network layers in the end-to-end path spanning user host, Internet, CDN and the datacenters, and has three diagnosis goals: detection, localization and root cause analysis (including cascading problems) of performance problems in user sessions with the cloud. The key component of the methods in YTrace is capturing and discovering causality, which we design based on a mix of instrumentation API, domain knowledge and blackbox methods. We show three case studies from production that span a large-scale distributed storage system, a datacenter-wide network, and an end-to-end video serving stack at Yahoo. We end by listing a number of open directions for performance diagnosis in cloud and content providers.
△ Less
Submitted 25 May, 2016; v1 submitted 10 February, 2016;
originally announced February 2016.
-
On monopole operators in supersymmetric Chern-Simons-matter theories
Authors:
Ofer Aharony,
Prithvi Narayan,
Tarun Sharma
Abstract:
We discuss monopole operators in $U(N_c)$ Chern-Simons-matter theories in three space-time dimensions. We mention an apparent problem in the matching of such operators in dualities between non-supersymmetric theories, and suggest a possible resolution. A similar apparent problem exists in the map** of chiral monopole operators in theories with ${\cal N}=2$ supersymmetry. We show that in many the…
▽ More
We discuss monopole operators in $U(N_c)$ Chern-Simons-matter theories in three space-time dimensions. We mention an apparent problem in the matching of such operators in dualities between non-supersymmetric theories, and suggest a possible resolution. A similar apparent problem exists in the map** of chiral monopole operators in theories with ${\cal N}=2$ supersymmetry. We show that in many theories the lowest naive chiral monopole operator is actually not chiral, and we find the lowest monopole operator that is actually chiral in these theories. It turns out that there are several different forms of this operator, depending on the number of colors, the number of flavours, and the Chern-Simons level. Since we use the supersymmetric index to find the lowest chiral monopoles, our results for these monopoles are guaranteed to be invariant under the dualities in supersymmetric theories. The theories we discuss are believed to be dual in the 't~Hooft large $N_c$ limit to classical high-spin gravity theories. We argue that these theories (supersymmetric or not) should not have classical solutions charged under the $U(1)$ gauge field in the high-spin multiplet.
△ Less
Submitted 8 March, 2015; v1 submitted 3 February, 2015;
originally announced February 2015.
-
Chiral 2D "Strange Metals" from N = 4 SYM
Authors:
Micha Berkooz,
Prithvi Narayan,
Amir Zait
Abstract:
Familiar field theories may contain closed subsectors made out of only fermions, which can be used to explore new and unusual phases of matter in lower dimensions. We focus on the fermionic su(1,1) sector in N=4 SYM and on its ground states, which are Fermi surface states/operators. By computing their spectrum to order $(g_{YM}^2 N)^2$, we argue that fluctuations around this fermi surface, within…
▽ More
Familiar field theories may contain closed subsectors made out of only fermions, which can be used to explore new and unusual phases of matter in lower dimensions. We focus on the fermionic su(1,1) sector in N=4 SYM and on its ground states, which are Fermi surface states/operators. By computing their spectrum to order $(g_{YM}^2 N)^2$, we argue that fluctuations around this fermi surface, within the sector and in the limit $k_F\rightarrow\infty$, are governed by a chiral 1+1 dimensional sector of the "strange metal" coset $SU(N)_N \otimes SU(N)_N/SU(N)_{2N}$. On the gravity side, the conjectured dual configuration is an $S=0$ degeneration of a rotating black hole. On general grounds we expect that the near horizon excitations of $(S=0,Ω=1,J\rightarrow\infty)$ degenerations of black holes will be governed by a chiral sector of a 1+1 CFT.
△ Less
Submitted 17 August, 2014;
originally announced August 2014.
-
How Many Queries Will Resolve Common Randomness?
Authors:
Himanshu Tyagi,
Prakash Narayan
Abstract:
A set of m terminals, observing correlated signals, communicate interactively to generate common randomness for a given subset of them. Knowing only the communication, how many direct queries of the value of the common randomness will resolve it? A general upper bound, valid for arbitrary signal alphabets, is developed for the number of such queries by using a query strategy that applies to all co…
▽ More
A set of m terminals, observing correlated signals, communicate interactively to generate common randomness for a given subset of them. Knowing only the communication, how many direct queries of the value of the common randomness will resolve it? A general upper bound, valid for arbitrary signal alphabets, is developed for the number of such queries by using a query strategy that applies to all common randomness and associated communication. When the underlying signals are independent and identically distributed repetitions of m correlated random variables, the number of queries can be exponential in signal length. For this case, the mentioned upper bound is tight and leads to a single-letter formula for the largest query exponent, which coincides with the secret key capacity of a corresponding multiterminal source model. In fact, the upper bound constitutes a strong converse for the optimum query exponent, and implies also a new strong converse for secret key capacity. A key tool, estimating the size of a large probability set in terms of Renyi entropy, is interpreted separately, too, as a lossless block coding result for general sources. As a particularization, it yields the classic result for a discrete memoryless source.
△ Less
Submitted 7 May, 2013;
originally announced May 2013.
-
Extremal Horizons with Reduced Symmetry: Hyperscaling Violation, Stripes, and a Classification for the Homogeneous Case
Authors:
Norihiro Iizuka,
Shamit Kachru,
Nilay Kundu,
Prithvi Narayan,
Nilanjan Sircar,
Sandip P. Trivedi,
Huajia Wang
Abstract:
Classifying the zero-temperature ground states of quantum field theories with finite charge density is a very interesting problem. Via holography, this problem is mapped to the classification of extremal charged black brane geometries with anti-de Sitter asymptotics. In a recent paper [1], we proposed a Bianchi classification of the extremal near-horizon geometries in five dimensions, in the case…
▽ More
Classifying the zero-temperature ground states of quantum field theories with finite charge density is a very interesting problem. Via holography, this problem is mapped to the classification of extremal charged black brane geometries with anti-de Sitter asymptotics. In a recent paper [1], we proposed a Bianchi classification of the extremal near-horizon geometries in five dimensions, in the case where they are homogeneous but, in general, anisotropic. Here, we extend our study in two directions: we show that Bianchi attractors can lead to new phases, and generalize the classification of homogeneous phases in a way suggested by holography. In the first direction, we show that hyperscaling violation can naturally be incorporated into the Bianchi horizons. We also find analytical examples of "striped" horizons. In the second direction, we propose a more complete classification of homogeneous horizon geometries where the natural mathematics involves real four-algebras with three dimensional sub-algebras. This gives rise to a richer set of possible near-horizon geometries, where the holographic radial direction is non-trivially intertwined with field theory spatial coordinates. We find examples of several of the new types in systems consisting of reasonably simple matter sectors coupled to gravity, while arguing that others are forbidden by the Null Energy Condition. Extremal horizons in four dimensions governed by three-algebras or four-algebras are also discussed.
△ Less
Submitted 6 January, 2013; v1 submitted 9 December, 2012;
originally announced December 2012.
-
Entangled Dilaton Dyons
Authors:
Nilay Kundu,
Prithvi Narayan,
Nilanjan Sircar,
Sandip P. Trivedi
Abstract:
Einstein-Maxwell theory coupled to a dilaton is known to give rise to extremal solutions with hyperscaling violation. We study the behaviour of these solutions in the presence of a small magnetic field. We find that in a region of parameter space the magnetic field is relevant in the infra-red and completely changes the behaviour of the solution which now flows to an $AdS_2\times R^2$ attractor. A…
▽ More
Einstein-Maxwell theory coupled to a dilaton is known to give rise to extremal solutions with hyperscaling violation. We study the behaviour of these solutions in the presence of a small magnetic field. We find that in a region of parameter space the magnetic field is relevant in the infra-red and completely changes the behaviour of the solution which now flows to an $AdS_2\times R^2$ attractor. As a result there is an extensive ground state entropy and the entanglement entropy of a sufficiently big region on the boundary grows like the volume. In particular, this happens for values of parameters at which the purely electric theory has an entanglement entropy growing with the area, $A$, like $A \log(A)$ which is believed to be a characteristic feature of a Fermi surface. Some other thermodynamic properties are also analysed and a more detailed characterisation of the entanglement entropy is also carried out in the presence of a magnetic field. Other regions of parameter space not described by the $AdS_2\times R^2$ end point are also discussed.
△ Less
Submitted 4 March, 2013; v1 submitted 9 August, 2012;
originally announced August 2012.
-
Bianchi Attractors: A Classification of Extremal Black Brane Geometries
Authors:
Norihiro Iizuka,
Shamit Kachru,
Nilay Kundu,
Prithvi Narayan,
Nilanjan Sircar,
Sandip P. Trivedi
Abstract:
Extremal black branes are of interest because they correspond to the ground states of field theories at finite charge density in gauge/gravity duality. The geometry of such a brane need not be translationally invariant in the spatial directions along which it extends. A less restrictive requirement is that of homogeneity, which still allows points along the spatial directions to be related to each…
▽ More
Extremal black branes are of interest because they correspond to the ground states of field theories at finite charge density in gauge/gravity duality. The geometry of such a brane need not be translationally invariant in the spatial directions along which it extends. A less restrictive requirement is that of homogeneity, which still allows points along the spatial directions to be related to each other by symmetries. In this paper, we find large new classes of homogeneous but anisotropic extremal black brane horizons, which could naturally arise in gauge/gravity dual pairs. In 4+1 dimensional spacetime, we show that such homogeneous black brane solutions are classified by the Bianchi classification, which is well known in the study of cosmology, and fall into nine classes. In a system of Einstein gravity with negative cosmological term coupled to one or two massive Abelian gauge fields, we find solutions with an additional scaling symmetry, which could correspond to the near-horizon geometries of such extremal black branes. These solutions realize many of the Bianchi classes. In one case, we construct the complete extremal solution which asymptotes to AdS space.
△ Less
Submitted 12 July, 2012; v1 submitted 23 January, 2012;
originally announced January 2012.
-
Holographic Fermi and Non-Fermi Liquids with Transitions in Dilaton Gravity
Authors:
Norihiro Iizuka,
Nilay Kundu,
Prithvi Narayan,
Sandip P. Trivedi
Abstract:
We study the two-point function for fermionic operators in a class of strongly coupled systems using the gauge-gravity correspondence. The gravity description includes a gauge field and a dilaton which determines the gauge coupling and the potential energy. Extremal black brane solutions in this system typically have vanishing entropy. By analyzing a charged fermion in these extremal black brane b…
▽ More
We study the two-point function for fermionic operators in a class of strongly coupled systems using the gauge-gravity correspondence. The gravity description includes a gauge field and a dilaton which determines the gauge coupling and the potential energy. Extremal black brane solutions in this system typically have vanishing entropy. By analyzing a charged fermion in these extremal black brane backgrounds we calculate the two-point function of the corresponding boundary fermionic operator. We find that in some region of parameter space it is of Fermi liquid type. Outside this region no well-defined quasi-particles exist, with the excitations acquiring a non-vanishing width at zero frequency. At the transition, the two-point function can exhibit non-Fermi liquid behaviour.
△ Less
Submitted 2 December, 2011; v1 submitted 5 May, 2011;
originally announced May 2011.
-
Supersymmetric States in Large N Chern-Simons-Matter Theories
Authors:
Shiraz Minwalla,
Prithvi Narayan,
Tarun Sharma,
V. Umesh,
Xi Yin
Abstract:
In this paper we study the spectrum of BPS operators/states in N=2 superconformal U(N) Chern-Simons-matter theories with adjoint chiral matter fields, with and without superpotential. The superconformal indices and conjectures on the full supersymmetric spectrum of the theories in the large N limit with up to two adjoint matter fields are presented. Our results suggest that some of these theories…
▽ More
In this paper we study the spectrum of BPS operators/states in N=2 superconformal U(N) Chern-Simons-matter theories with adjoint chiral matter fields, with and without superpotential. The superconformal indices and conjectures on the full supersymmetric spectrum of the theories in the large N limit with up to two adjoint matter fields are presented. Our results suggest that some of these theories may have supergravity duals at strong coupling, while some others may be dual to higher spin theories of gravity at strong coupling. For the N=2 theory with no superpotential, we study the renormalization of R-charge at finite 't Hooft coupling using "Z-minimization". A particularly intriguing result is found in the case of one adjoint matter.
△ Less
Submitted 12 April, 2011; v1 submitted 4 April, 2011;
originally announced April 2011.
-
Secret Key and Private Key Constructions for Simple Multiterminal Source Models
Authors:
Chunxuan Ye,
Prakash Narayan
Abstract:
We propose an approach for constructing secret and private keys based on the long-known Slepian-Wolf code, due to Wyner, for correlated sources connected by a virtual additive noise channel. Our work is motivated by results of Csiszár and Narayan which highlight innate connections between secrecy generation by multiple terminals that observe correlated source signals and Slepian-Wolf near-lossless…
▽ More
We propose an approach for constructing secret and private keys based on the long-known Slepian-Wolf code, due to Wyner, for correlated sources connected by a virtual additive noise channel. Our work is motivated by results of Csiszár and Narayan which highlight innate connections between secrecy generation by multiple terminals that observe correlated source signals and Slepian-Wolf near-lossless data compression. Explicit procedures for such constructions and their substantiation are provided. The performance of low density parity check channel codes in devising a new class of secret keys is examined.
△ Less
Submitted 12 August, 2010;
originally announced August 2010.
-
Perfect Omniscience, Perfect Secrecy and Steiner Tree Packing
Authors:
Sirin Nitinawarat,
Prakash Narayan
Abstract:
We consider perfect secret key generation for a ``pairwise independent network'' model in which every pair of terminals share a random binary string, with the strings shared by distinct terminal pairs being mutually independent. The terminals are then allowed to communicate interactively over a public noiseless channel of unlimited capacity. All the terminals as well as an eavesdropper observe thi…
▽ More
We consider perfect secret key generation for a ``pairwise independent network'' model in which every pair of terminals share a random binary string, with the strings shared by distinct terminal pairs being mutually independent. The terminals are then allowed to communicate interactively over a public noiseless channel of unlimited capacity. All the terminals as well as an eavesdropper observe this communication. The objective is to generate a perfect secret key shared by a given set of terminals at the largest rate possible, and concealed from the eavesdropper.
First, we show how the notion of perfect omniscience plays a central role in characterizing perfect secret key capacity. Second, a multigraph representation of the underlying secrecy model leads us to an efficient algorithm for perfect secret key generation based on maximal Steiner tree packing. This algorithm attains capacity when all the terminals seek to share a key, and, in general, attains at least half the capacity. Third, when a single ``helper'' terminal assists the remaining ``user'' terminals in generating a perfect secret key, we give necessary and sufficient conditions for the optimality of the algorithm; also, a ``weak'' helper is shown to be sufficient for optimality.
△ Less
Submitted 5 August, 2010;
originally announced August 2010.
-
Secret Key Generation for a Pairwise Independent Network Model
Authors:
Sirin Nitinawarat,
Chunxuan Ye,
Alexander Barg,
Prakash Narayan,
Alex Reznik
Abstract:
We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of terminals. The terminals are then allowed to communicate publicly with all such communication being observed by all the terminals. The objective is to generate a secret key shared by a given subset o…
▽ More
We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of terminals. The terminals are then allowed to communicate publicly with all such communication being observed by all the terminals. The objective is to generate a secret key shared by a given subset of terminals at the largest rate possible, with the cooperation of any remaining terminals. Secrecy is required from an eavesdropper that has access to the public interterminal communication. A (single-letter) formula for secret key capacity brings out a natural connection between the problem of secret key generation and a combinatorial problem of maximal packing of Steiner trees in an associated multigraph. An explicit algorithm is proposed for secret key generation based on a maximal packing of Steiner trees in a multigraph; the corresponding maximum rate of Steiner tree packing is thus a lower bound for the secret key capacity. When only two of the terminals or when all the terminals seek to share a secret key, the mentioned algorithm achieves secret key capacity in which case the bound is tight.
△ Less
Submitted 5 August, 2010; v1 submitted 20 July, 2010;
originally announced July 2010.
-
When is a Function Securely Computable?
Authors:
Himanshu Tyagi,
Prakash Narayan,
Piyush Gupta
Abstract:
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication. We show that the function is securely computable if and only if its entropy is less than the "aided secret key" capacity of an associated secrecy…
▽ More
A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication. We show that the function is securely computable if and only if its entropy is less than the "aided secret key" capacity of an associated secrecy generation model, for which a single-letter characterization is provided.
△ Less
Submitted 17 July, 2010;
originally announced July 2010.
-
On The Stability Of Non-Supersymmetric AdS Vacua
Authors:
Prithvi Narayan,
Sandip P. Trivedi
Abstract:
We consider two infinite families of Non-Supersymmetric $AdS_4$ vacua, called Type 2) and Type 3) vacua, that arise in massive IIA supergravity with flux. We show that both families are perturbatively stable. We then examine non-perturbative decays of these vacua to other supersymmetric and non-supersymmetric $AdS_4$ vacua mediated by instantons in the thin wall approximation. We find that many de…
▽ More
We consider two infinite families of Non-Supersymmetric $AdS_4$ vacua, called Type 2) and Type 3) vacua, that arise in massive IIA supergravity with flux. We show that both families are perturbatively stable. We then examine non-perturbative decays of these vacua to other supersymmetric and non-supersymmetric $AdS_4$ vacua mediated by instantons in the thin wall approximation. We find that many decays are ruled out since the tension of the interpolating domain wall is too big compared to the energy difference in AdS units. In fact, within our approximations no decays of Type 2) vacua are allowed, although some decays are only marginally forbidden. This can be understood in terms of a "pairing symmetry" in the landscape which relate Type 2) vacua with supersymmetric ones of the same energy.
△ Less
Submitted 24 May, 2010; v1 submitted 24 February, 2010;
originally announced February 2010.
-
The Gelfand-Pinsker Channel: Strong Converse and Upper Bound for the Reliability Function
Authors:
Himanshu Tyagi,
Prakash Narayan
Abstract:
We consider a Gelfand-Pinsker discrete memoryless channel (DMC) model and provide a strong converse for its capacity. The strong converse is then used to obtain an upper bound on the reliability function. Instrumental in our proofs is a new technical lemma which provides an upper bound for the rate of codes with codewords that are conditionally typical over large message dependent subsets of a t…
▽ More
We consider a Gelfand-Pinsker discrete memoryless channel (DMC) model and provide a strong converse for its capacity. The strong converse is then used to obtain an upper bound on the reliability function. Instrumental in our proofs is a new technical lemma which provides an upper bound for the rate of codes with codewords that are conditionally typical over large message dependent subsets of a typical set of state sequences. This technical result is a nonstraightforward analog of a known result for a DMC without states that provides an upper bound on the rate of a good code with codewords of a fixed type (to be found in, for instance, the Csiszar-Korner book).
△ Less
Submitted 4 October, 2009;
originally announced October 2009.
-
The Private Key Capacity Region for Three Terminals
Authors:
Chunxuan Ye,
Prakash Narayan
Abstract:
We consider a model with three terminals and examine the problem of characterizing the largest rates at which two pairs of terminals can simultaneously generate private keys, each of which is effectively concealed from the remaining terminal.
We consider a model with three terminals and examine the problem of characterizing the largest rates at which two pairs of terminals can simultaneously generate private keys, each of which is effectively concealed from the remaining terminal.
△ Less
Submitted 12 November, 2005;
originally announced November 2005.
-
Secret Key and Private Key Constructions for Simple Multiterminal Source Models
Authors:
Chunxuan Ye,
Prakash Narayan
Abstract:
This work is motivated by recent results of Csiszar and Narayan (IEEE Trans. on Inform. Theory, Dec. 2004), which highlight innate connections between secrecy generation by multiple terminals and multiterminal Slepian-Wolf near-lossless data compression (sans secrecy restrictions). We propose a new approach for constructing secret and private keys based on the long-known Slepian-Wolf code for so…
▽ More
This work is motivated by recent results of Csiszar and Narayan (IEEE Trans. on Inform. Theory, Dec. 2004), which highlight innate connections between secrecy generation by multiple terminals and multiterminal Slepian-Wolf near-lossless data compression (sans secrecy restrictions). We propose a new approach for constructing secret and private keys based on the long-known Slepian-Wolf code for sources connected by a virtual additive noise channel, due to Wyner (IEEE Trans. on Inform. Theory, Jan. 1974). Explicit procedures for such constructions, and their substantiation, are provided.
△ Less
Submitted 12 November, 2005;
originally announced November 2005.
-
The Secret Key-Private Key Capacity Region for Three Terminals
Authors:
Chunxuan Ye,
Prakash Narayan
Abstract:
We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all the rates at which all three terminals can generate a ``secret key,'' and -- simultaneously -- two designated terminals can generate a ``private key'' which is effectively concealed from the remaining terminal; both keys are also conceale…
▽ More
We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all the rates at which all three terminals can generate a ``secret key,'' and -- simultaneously -- two designated terminals can generate a ``private key'' which is effectively concealed from the remaining terminal; both keys are also concealed from an eavesdropper that observes the public communication. Inner and outer bounds for the ``secret key--private key capacity region'' are derived. Under a certain special condition, these bounds coincide to yield the (exact) secret key--private key capacity region.
△ Less
Submitted 12 November, 2005;
originally announced November 2005.