-
A Multivocal Review of MLOps Practices, Challenges and Open Issues
Authors:
Beyza Eken,
Samodha Pallewatta,
Nguyen Khoi Tran,
Ayse Tosun,
Muhammad Ali Babar
Abstract:
With the increasing trend of Machine Learning (ML) enabled software applications, the paradigm of ML Operations (MLOps) has gained tremendous attention of researchers and practitioners. MLOps encompasses the practices and technologies for streamlining the resources and monitoring needs of operationalizing ML models. Software development practitioners need access to the detailed and easily understa…
▽ More
With the increasing trend of Machine Learning (ML) enabled software applications, the paradigm of ML Operations (MLOps) has gained tremendous attention of researchers and practitioners. MLOps encompasses the practices and technologies for streamlining the resources and monitoring needs of operationalizing ML models. Software development practitioners need access to the detailed and easily understandable knowledge of MLOps workflows, practices, challenges and solutions to effectively and efficiently support the adoption of MLOps. Whilst the academic and industry literature on the MLOps has been growing rapidly, there have been relatively a few attempts at systematically synthesizing and analyzing the vast amount of existing literature of MLOps for improving ease of access and understanding. We conducted a Multivocal Literature Review (MLR) of 150 relevant academic studies and 48 gray literature to provide a comprehensive body of knowledge on MLOps. Through this MLR, we identified the emerging MLOps practices, adoption challenges and solutions related to various areas, including development and operation of complex pipelines, managing production at scale, managing artifacts, and ensuring quality, security, governance, and ethical aspects. We also report the socio-technical aspect of MLOps relating to diverse roles involved and collaboration practices across them through the MLOps lifecycle. We assert that this MLR provides valuable insights to researchers and practitioners seeking to navigate the rapidly evolving landscape of MLOps. We also identify the open issues that need to be addressed in order to advance the current state-of-the-art of MLOps.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
On the infinite time horizon approximation for Lévy-driven McKean-Vlasov SDEs with non-globally Lipschitz continuous and super-linearly growth drift and diffusion coefficients
Authors:
Ngoc Khue Tran,
Trung-Thuy Kieu,
Duc-Trong Luong,
Hoang-Long Ngo
Abstract:
This paper studies the numerical approximation for McKean-Vlasov stochastic differential equations driven by Lévy processes. We propose a tamed-adaptive Euler-Maruyama scheme and consider its strong convergence in both finite and infinite time horizons when applying for some classes of Lévy-driven McKean-Vlasov stochastic differential equations with non-globally Lipschitz continuous and super-line…
▽ More
This paper studies the numerical approximation for McKean-Vlasov stochastic differential equations driven by Lévy processes. We propose a tamed-adaptive Euler-Maruyama scheme and consider its strong convergence in both finite and infinite time horizons when applying for some classes of Lévy-driven McKean-Vlasov stochastic differential equations with non-globally Lipschitz continuous and super-linearly growth drift and diffusion coefficients.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
An Empirically Grounded Reference Architecture for Software Supply Chain Metadata Management
Authors:
Nguyen Khoi Tran,
Samodha Pallewatta,
M. Ali Babar
Abstract:
With the rapid rise in Software Supply Chain (SSC) attacks, organisations need thorough and trustworthy visibility over the entire SSC of their software inventory to detect risks early and identify compromised assets rapidly in the event of an SSC attack. One way to achieve such visibility is through SSC metadata, machine-readable and authenticated documents describing an artefact's lifecycle. Ado…
▽ More
With the rapid rise in Software Supply Chain (SSC) attacks, organisations need thorough and trustworthy visibility over the entire SSC of their software inventory to detect risks early and identify compromised assets rapidly in the event of an SSC attack. One way to achieve such visibility is through SSC metadata, machine-readable and authenticated documents describing an artefact's lifecycle. Adopting SSC metadata requires organisations to procure or develop a Software Supply Chain Metadata Management system (SCM2), a suite of software tools for performing life cycle activities of SSC metadata documents such as creation, signing, distribution, and consumption. Selecting or develo** an SCM2 is challenging due to the lack of a comprehensive domain model and architectural blueprint to aid practitioners in navigating the vast design space of SSC metadata terminologies, frameworks, and solutions. This paper addresses the above-mentioned challenge by presenting an empirically grounded Reference Architecture (RA) comprising of a domain model and an architectural blueprint for SCM2 systems. Our proposed RA is constructed systematically on an empirical foundation built with industry-driven and peer-reviewed SSC security frameworks. Our theoretical evaluation, which consists of an architectural map** of five prominent SSC security tools on the RA, ensures its validity and applicability, thus affirming the proposed RA as an effective framework for analysing existing SCM2 solutions and guiding the engineering of new SCM2 systems.
△ Less
Submitted 8 June, 2024; v1 submitted 10 October, 2023;
originally announced October 2023.
-
ProML: A Decentralised Platform for Provenance Management of Machine Learning Software Systems
Authors:
Nguyen Khoi Tran,
Bushra Sabir,
M. Ali Babar,
Nini Cui,
Mehran Abolhasan,
Justin Lipman
Abstract:
Large-scale Machine Learning (ML) based Software Systems are increasingly developed by distributed teams situated in different trust domains. Insider threats can launch attacks from any domain to compromise ML assets (models and datasets). Therefore, practitioners require information about how and by whom ML assets were developed to assess their quality attributes such as security, safety, and fai…
▽ More
Large-scale Machine Learning (ML) based Software Systems are increasingly developed by distributed teams situated in different trust domains. Insider threats can launch attacks from any domain to compromise ML assets (models and datasets). Therefore, practitioners require information about how and by whom ML assets were developed to assess their quality attributes such as security, safety, and fairness. Unfortunately, it is challenging for ML teams to access and reconstruct such historical information of ML assets (ML provenance) because it is generally fragmented across distributed ML teams and threatened by the same adversaries that attack ML assets. This paper proposes ProML, a decentralised platform that leverages blockchain and smart contracts to empower distributed ML teams to jointly manage a single source of truth about circulated ML assets' provenance without relying on a third party, which is vulnerable to insider threats and presents a single point of failure. We propose a novel architectural approach called Artefact-as-a-State-Machine to leverage blockchain transactions and smart contracts for managing ML provenance information and introduce a user-driven provenance capturing mechanism to integrate existing scripts and tools to ProML without compromising participants' control over their assets and toolchains. We evaluate the performance and overheads of ProML by benchmarking a proof-of-concept system on a global blockchain. Furthermore, we assessed ProML's security against a threat model of a distributed ML workflow.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
Mod2Dash: A Framework for Model-Driven Dashboards Generation
Authors:
Liuyue Jiang,
Nguyen Khoi Tran,
M. Ali Babar
Abstract:
The construction of an interactive dashboard involves deciding on what information to present and how to display it and implementing those design decisions to create an operational dashboard. Traditionally, a dashboard's design is implied in the deployed dashboard rather than captured explicitly as a digital artifact, preventing it from being backed up, version-controlled, and shared. Moreover, pr…
▽ More
The construction of an interactive dashboard involves deciding on what information to present and how to display it and implementing those design decisions to create an operational dashboard. Traditionally, a dashboard's design is implied in the deployed dashboard rather than captured explicitly as a digital artifact, preventing it from being backed up, version-controlled, and shared. Moreover, practitioners have to implement this implicit design manually by coding or configuring it on a dashboard platform. This paper proposes Mod2Dash, a software framework that enables practitioners to capture their dashboard designs as models and generate operational dashboards automatically from these models. The framework also provides a GUI-driven customization approach for practitioners to fine-tune the auto-generated dashboards and update their models. With these abilities, Mod2Dash enables practitioners to rapidly prototype and deploy dashboards for both operational and research purposes. We evaluated the framework's effectiveness in a case study on cyber security visualization for decision support. A proof-of-concept of Mod2Dash was employed to model and reconstruct 31 diverse real-world cyber security dashboards. A human-assisted comparison between the Mod2Dash-generated dashboards and the baseline dashboards shows a close matching, indicating the framework's effectiveness for real-world scenarios.
△ Less
Submitted 15 May, 2022;
originally announced May 2022.
-
A Framework for Automating Deployment and Evaluation of Blockchain Network
Authors:
Nguyen Khoi Tran,
M. Ali Babar,
Andrew Walters
Abstract:
Blockchain network deployment and evaluation have become prevalent due to the demand for private blockchains by enterprises, governments, and edge computing systems. Whilst a blockchain network's deployment and evaluation are driven by its architecture, practitioners still need to learn and carry out many repetitive and error-prone activities to transform architecture into an operational blockchai…
▽ More
Blockchain network deployment and evaluation have become prevalent due to the demand for private blockchains by enterprises, governments, and edge computing systems. Whilst a blockchain network's deployment and evaluation are driven by its architecture, practitioners still need to learn and carry out many repetitive and error-prone activities to transform architecture into an operational blockchain network and evaluate it. Greater efficiency could be gained if practitioners focus solely on the architecture design, a valuable and hard-to-automate activity, and leave the implementation steps to an automation framework. This paper proposes an automation framework called NVAL (Network Deployment and Evaluation Framework), which can deploy and evaluate blockchain networks based on their architecture specifications. The key idea of NVAL is reusing and combining the existing automation scripts and utilities of various blockchain types to deploy and evaluate incoming blockchain network architectures. We propose a novel meta-model to capture blockchain network architectures as computer-readable artefacts and employ a state-space search approach to plan and conduct their deployment and evaluation. An evaluative case study shows that NVAL successfully combines seven deployment and evaluation procedures to deploy 65 networks with 12 different architectures and generate 295 evaluation datasets whilst incurring a negligible processing time overhead.
△ Less
Submitted 24 July, 2022; v1 submitted 20 March, 2022;
originally announced March 2022.
-
Density estimates for jump diffusion processes
Authors:
Arturo Kohatsu-Higa,
Eulalia Nualart,
Ngoc Khue Tran
Abstract:
We consider a real-valued diffusion process with a linear jump term driven by a Poisson point process and we assume that the jump amplitudes have a centered density with finite moments. We show upper and lower estimates for the density of the solution in the case that the jump amplitudes follow a Gaussian or Laplacian law. The proof of the lower bound uses a general expression for the density of t…
▽ More
We consider a real-valued diffusion process with a linear jump term driven by a Poisson point process and we assume that the jump amplitudes have a centered density with finite moments. We show upper and lower estimates for the density of the solution in the case that the jump amplitudes follow a Gaussian or Laplacian law. The proof of the lower bound uses a general expression for the density of the solution in terms of the convolution of the density of the continuous part and the jump amplitude density. The upper bound uses an upper tail estimate in terms of the jump amplitude distribution and techniques of the Malliavin calculus in order to bound the density by the tails of the solution. We also extend the lower bounds to the multidimensional case.
△ Less
Submitted 25 April, 2021;
originally announced April 2021.
-
Comparative Visual Analytics for Assessing Medical Records with Sequence Embedding
Authors:
Rongchen Guo,
Takanori Fujiwara,
Yiran Li,
Kelly M. Lima,
Soman Sen,
Nam K. Tran,
Kwan-Liu Ma
Abstract:
Machine learning for data-driven diagnosis has been actively studied in medicine to provide better healthcare. Supporting analysis of a patient cohort similar to a patient under treatment is a key task for clinicians to make decisions with high confidence. However, such analysis is not straightforward due to the characteristics of medical records: high dimensionality, irregularity in time, and spa…
▽ More
Machine learning for data-driven diagnosis has been actively studied in medicine to provide better healthcare. Supporting analysis of a patient cohort similar to a patient under treatment is a key task for clinicians to make decisions with high confidence. However, such analysis is not straightforward due to the characteristics of medical records: high dimensionality, irregularity in time, and sparsity. To address this challenge, we introduce a method for similarity calculation of medical records. Our method employs event and sequence embeddings. While we use an autoencoder for the event embedding, we apply its variant with the self-attention mechanism for the sequence embedding. Moreover, in order to better handle the irregularity of data, we enhance the self-attention mechanism with consideration of different time intervals. We have developed a visual analytics system to support comparative studies of patient records. To make a comparison of sequences with different lengths easier, our system incorporates a sequence alignment method. Through its interactive interface, the user can quickly identify patients of interest and conveniently review both the temporal and multivariate aspects of the patient records. We demonstrate the effectiveness of our design and system with case studies using a real-world dataset from the neonatal intensive care unit of UC Davis.
△ Less
Submitted 23 March, 2020; v1 submitted 18 February, 2020;
originally announced February 2020.
-
Local asymptotic properties for the growth rate of a jump-type CIR process
Authors:
Mohamed Ben Alaya,
Ahmed Kebaier,
Gyula Pap,
Ngoc Khue Tran
Abstract:
In this paper, we consider a one-dimensional jump-type Cox-Ingersoll-Ross process driven by a Brownian motion and a subordinator, whose growth rate is a unknown parameter. The Lévy measure of the subordinator is finite or infinite. Considering the process observed continuously or discretely at high frequency, we derive the local asymptotic properties for the growth rate in both ergodic and non-erg…
▽ More
In this paper, we consider a one-dimensional jump-type Cox-Ingersoll-Ross process driven by a Brownian motion and a subordinator, whose growth rate is a unknown parameter. The Lévy measure of the subordinator is finite or infinite. Considering the process observed continuously or discretely at high frequency, we derive the local asymptotic properties for the growth rate in both ergodic and non-ergodic cases. Three cases are distinguished: subcritical, critical and supercritical. Local asymptotic normality (LAN) is proved in the subcritical case, local asymptotic quadraticity (LAQ) is derived in the critical case, and local asymptotic mixed normality (LAMN) is shown in the supercritical case. To do so, techniques of Malliavin calculus and a subtle analysis on the jump structure of the subordinator involving the amplitude of jumps and number of jumps are essentially used.
△ Less
Submitted 28 March, 2019; v1 submitted 28 February, 2019;
originally announced March 2019.
-
Internet of Things Search Engine: Concepts, Classification, and Open Issues
Authors:
Nguyen Khoi Tran,
Quan Z. Sheng,
M. Ali Babar,
Lina Yao,
Wei Emma Zhang,
Schahram Dustdar
Abstract:
This article focuses on the complicated yet still relatively immature area of the Internet of Things Search Engines (IoTSE). It introduces related concepts of IoTSE and a model called meta-path to describe and classify IoTSE systems based on their functionality. Based on these concepts, we have organized the research and development efforts on IoTSE into eight groups and presented the representati…
▽ More
This article focuses on the complicated yet still relatively immature area of the Internet of Things Search Engines (IoTSE). It introduces related concepts of IoTSE and a model called meta-path to describe and classify IoTSE systems based on their functionality. Based on these concepts, we have organized the research and development efforts on IoTSE into eight groups and presented the representative works in each group. The concepts and ideas presented in this article are generated from an extensive structured study on over 200 works spanning over one decade of IoTSE research and development.
△ Less
Submitted 7 December, 2018;
originally announced December 2018.
-
Local asymptotic properties for Cox-Ingersoll-Ross process with discrete observations
Authors:
Mohamed Ben Alaya,
Ahmed Kebaier,
Ngoc Khue Tran
Abstract:
In this paper, we consider a one-dimensional Cox-Ingersoll-Ross (CIR) process whose drift coefficient depends on unknown parameters. Considering the process discretely observed at high frequency, we prove the local asymptotic normality property in the subcritical case, the local asymptotic quadraticity in the critical case, and the local asymptotic mixed normality property in the supercritical cas…
▽ More
In this paper, we consider a one-dimensional Cox-Ingersoll-Ross (CIR) process whose drift coefficient depends on unknown parameters. Considering the process discretely observed at high frequency, we prove the local asymptotic normality property in the subcritical case, the local asymptotic quadraticity in the critical case, and the local asymptotic mixed normality property in the supercritical case. To obtain these results, we use the Malliavin calculus techniques developed recently for CIR process by Alòs et {\it al.} \cite{AE08} and Altmayer et {\it al.} \cite{AN14} together with the $L^p$-norm estimation for positive and negative moments of the CIR process obtained by Bossy et {\it al.} \cite{BD07} and Ben Alaya et {\it al.} \cite{BK12,BK13}. In this study, we require the same conditions of high frequency $Δ_n\rightarrow 0$ and infinite horizon $nΔ_n\rightarrow\infty$ as in the case of ergodic diffusions with globally Lipschitz coefficients studied earlier by Gobet \cite{G02}. However, in the non-ergodic cases, additional assumptions on the decreasing rate of $Δ_n$ are required due to the fact that the square root diffusion coefficient of the CIR process is not regular enough. Indeed, we assume $nΔ_n^{3}\to 0$ for the critical case and $Δ_n^{2}e^{-b_0nΔ_n}\to 0$ for the supercritical case.
△ Less
Submitted 25 June, 2020; v1 submitted 23 August, 2017;
originally announced August 2017.
-
How to Search the Internet Archive Without Indexing It
Authors:
Nattiya Kanhabua,
Philipp Kemkes,
Wolfgang Nejdl,
Tu Ngoc Nguyen,
Felipe Reis,
Nam Khanh Tran
Abstract:
Significant parts of cultural heritage are produced on the web during the last decades. While easy accessibility to the current web is a good baseline, optimal access to the past web faces several challenges. This includes dealing with large-scale web archive collections and lacking of usage logs that contain implicit human feedback most relevant for today's web search. In this paper, we propose a…
▽ More
Significant parts of cultural heritage are produced on the web during the last decades. While easy accessibility to the current web is a good baseline, optimal access to the past web faces several challenges. This includes dealing with large-scale web archive collections and lacking of usage logs that contain implicit human feedback most relevant for today's web search. In this paper, we propose an entity-oriented search system to support retrieval and analytics on the Internet Archive. We use Bing to retrieve a ranked list of results from the current web. In addition, we link retrieved results to the WayBack Machine; thus allowing keyword search on the Internet Archive without processing and indexing its raw archived content. Our search system complements existing web archive search tools through a user-friendly interface, which comes close to the functionalities of modern web search engines (e.g., keyword search, query auto-completion and related query suggestion), and provides a great benefit of taking user feedback on the current web into account also for web archive search. Through extensive experiments, we conduct quantitative and qualitative analyses in order to provide insights that enable further research on and practical applications of web archives.
△ Less
Submitted 28 January, 2017;
originally announced January 2017.
-
Semantic Annotation for Microblog Topics Using Wikipedia Temporal Information
Authors:
Tuan Tran,
Nam Khanh Tran,
Teka Hadgu Asmelash,
Robert Jäschke
Abstract:
Trending topics in microblogs such as Twitter are valuable resources to understand social aspects of real-world events. To enable deep analyses of such trends, semantic annotation is an effective approach; yet the problem of annotating microblog trending topics is largely unexplored by the research community. In this work, we tackle the problem of map** trending Twitter topics to entities from W…
▽ More
Trending topics in microblogs such as Twitter are valuable resources to understand social aspects of real-world events. To enable deep analyses of such trends, semantic annotation is an effective approach; yet the problem of annotating microblog trending topics is largely unexplored by the research community. In this work, we tackle the problem of map** trending Twitter topics to entities from Wikipedia. We propose a novel model that complements traditional text-based approaches by rewarding entities that exhibit a high temporal correlation with topics during their burst time period. By exploiting temporal information from the Wikipedia edit history and page view logs, we have improved the annotation performance by 17-28\%, as compared to the competitive baselines.
△ Less
Submitted 14 January, 2017;
originally announced January 2017.
-
Classification and Learning-to-rank Approaches for Cross-Device Matching at CIKM Cup 2016
Authors:
Nam Khanh Tran
Abstract:
In this paper, we propose two methods for tackling the problem of cross-device matching for online advertising at CIKM Cup 2016. The first method considers the matching problem as a binary classification task and solve it by utilizing ensemble learning techniques. The second method defines the matching problem as a ranking task and effectively solve it with using learning-to-rank algorithms. The r…
▽ More
In this paper, we propose two methods for tackling the problem of cross-device matching for online advertising at CIKM Cup 2016. The first method considers the matching problem as a binary classification task and solve it by utilizing ensemble learning techniques. The second method defines the matching problem as a ranking task and effectively solve it with using learning-to-rank algorithms. The results show that the proposed methods obtain promising results, in which the ranking-based method outperforms the classification-based method for the task.
△ Less
Submitted 20 December, 2016;
originally announced December 2016.
-
LAN property for an ergodic Ornstein-Uhlenbeck process with Poisson jumps
Authors:
Ngoc Khue Tran
Abstract:
In this paper, we consider an ergodic Ornstein-Uhlenbeck process with jumps driven by a Brownian motion and a compensated Poisson process, whose drift and diffusion coefficients as well as its jump intensity depend on unknown parameters. Considering the process discretely observed at high frequency, we derive the local asymptotic normality property. To obtain this result, Malliavin calculus and Gi…
▽ More
In this paper, we consider an ergodic Ornstein-Uhlenbeck process with jumps driven by a Brownian motion and a compensated Poisson process, whose drift and diffusion coefficients as well as its jump intensity depend on unknown parameters. Considering the process discretely observed at high frequency, we derive the local asymptotic normality property. To obtain this result, Malliavin calculus and Girsanov's theorem are applied to write the log-likelihood ratio in terms of sums of conditional expectations, for which a central limit theorem for triangular arrays can be applied.
△ Less
Submitted 11 March, 2016; v1 submitted 24 June, 2015;
originally announced June 2015.
-
LAN property for an ergodic diffusion with jumps
Authors:
Arturo Kohatsu-Higa,
Eulalia Nualart,
Ngoc Khue Tran
Abstract:
In this paper, we consider a multidimensional ergodic diffusion with jumps driven by a Brownian motion and a Poisson random measure associated with a pure-jump Lévy process with finite Lévy measure, whose drift coefficient depends on an unknown parameter. Considering the process discretely observed at high frequency, we derive the local asymptotic normality (LAN) property.
In this paper, we consider a multidimensional ergodic diffusion with jumps driven by a Brownian motion and a Poisson random measure associated with a pure-jump Lévy process with finite Lévy measure, whose drift coefficient depends on an unknown parameter. Considering the process discretely observed at high frequency, we derive the local asymptotic normality (LAN) property.
△ Less
Submitted 29 September, 2016; v1 submitted 2 June, 2015;
originally announced June 2015.
-
LAN property for a linear model with jumps
Authors:
Arturo Kohatsu-Higa,
Eulalia Nualart,
Ngoc Khue Tran
Abstract:
In this paper, we consider a linear model with jumps driven by a Brownian motion and a compensated Poisson process, whose drift and diffusion coefficients as well as its intensity are unknown parameters. Supposing that the process is observed discretely at high frequency we derive the local asymptotic normality (LAN) property. In order to obtain this result, Malliavin calculus and Girsanov's theor…
▽ More
In this paper, we consider a linear model with jumps driven by a Brownian motion and a compensated Poisson process, whose drift and diffusion coefficients as well as its intensity are unknown parameters. Supposing that the process is observed discretely at high frequency we derive the local asymptotic normality (LAN) property. In order to obtain this result, Malliavin calculus and Girsanov's theorem are applied in order to write the log-likelihood ratio in terms of sums of conditional expectations, for which a central limit theorem for triangular arrays can be applied.
△ Less
Submitted 20 February, 2014;
originally announced February 2014.
-
On the LAMN property for continuous observations of some diffusion processes with jumps
Authors:
Ngoc Khue Tran,
Eulalia Nualart
Abstract:
In this paper, we consider a diffusion process with jumps whose drift and jump coefficient depend on an unknown parameter. We then give a self-contained proof of the local asymptotic mixed normality (LAMN) property when the process is observed continuously in a time interval $[0; T]$ as $T\to\infty$, and derive, as a consequence, the local asymptotic normality (LAN) property in the ergodic case. F…
▽ More
In this paper, we consider a diffusion process with jumps whose drift and jump coefficient depend on an unknown parameter. We then give a self-contained proof of the local asymptotic mixed normality (LAMN) property when the process is observed continuously in a time interval $[0; T]$ as $T\to\infty$, and derive, as a consequence, the local asymptotic normality (LAN) property in the ergodic case. For this, we give a proof of a Girsanov's theorem and a Central Limit theorem for a pure jump martingale. Our results could be viewed as a consequence of the LAMN property for semimartingales proved by Luschgy [15], using the Girsanov's theorem for semimartingales obtained in Jacod and Shiryaev [9], and the Central Limit theorem for semimartingales established by Sørensen [21] and Feigin [3]. The aim of this paper is to present a proof of these results without using this abstract semimartingale theory but integral equations with respect to Poisson random measures.
△ Less
Submitted 21 March, 2014; v1 submitted 29 April, 2013;
originally announced April 2013.
-
On quantum teleportation with beam-splitter-generated entanglement
Authors:
N. K. Tran,
O. Pfister
Abstract:
Following the lead of Cochrane, Milburn, and Munro [Phys. Rev. A {\bf 62}, 062307 (2000)], we investigate theoretically quantum teleportation by means of the number-sum and phase-difference variables. We study Fock-state entanglement generated by a beam splitter and show that two-mode Fock-state inputs can be entangled by a beam splitter into close approximations of maximally entangled eigenstat…
▽ More
Following the lead of Cochrane, Milburn, and Munro [Phys. Rev. A {\bf 62}, 062307 (2000)], we investigate theoretically quantum teleportation by means of the number-sum and phase-difference variables. We study Fock-state entanglement generated by a beam splitter and show that two-mode Fock-state inputs can be entangled by a beam splitter into close approximations of maximally entangled eigenstates of the phase difference and the photon-number sum (Einstein-Podolsky-Rosen -- EPR -- states). Such states could be experimentally feasible with on-demand single-photon sources. We show that the teleportation fidelity can reach near unity when such ``quasi-EPR'' states are used as the quantum channel.
△ Less
Submitted 18 July, 2001; v1 submitted 13 July, 2001;
originally announced July 2001.