-
Efficient entanglement purification based on noise guessing decoding
Authors:
André Roque,
Diogo Cruz,
Francisco A. Monteiro,
Bruno C. Coutinho
Abstract:
In this paper, we propose a novel bipartite entanglement purification protocol built upon hashing and upon the guessing random additive noise decoding (GRAND) approach recently devised for classical error correction codes. Our protocol offers substantial advantages over existing hashing protocols, requiring fewer qubits for purification, achieving higher fidelities, and delivering better yields wi…
▽ More
In this paper, we propose a novel bipartite entanglement purification protocol built upon hashing and upon the guessing random additive noise decoding (GRAND) approach recently devised for classical error correction codes. Our protocol offers substantial advantages over existing hashing protocols, requiring fewer qubits for purification, achieving higher fidelities, and delivering better yields with reduced computational costs. We provide numerical and semi-analytical results to corroborate our findings and provide a detailed comparison with the hashing protocol of Bennet et al. Although that pioneering work devised performance bounds, it did not offer an explicit construction for implementation. The present work fills that gap, offering both an explicit and more efficient purification method. We demonstrate that our protocol is capable of purifying states with noise on the order of 10% per Bell pair even with a small ensemble of 16 pairs. The work explores a measurement-based implementation of the protocol to address practical setups with noise. This work opens the path to practical and efficient entanglement purification using hashing-based methods with feasible computational costs. Compared to the original hashing protocol, the proposed method can achieve some desired fidelity with a number of initial resources up to one hundred times smaller. Therefore, the proposed method seems well-fit for future quantum networks with a limited number of resources and entails a relatively low computational overhead.
△ Less
Submitted 13 November, 2023; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Decision-Theoretic Question Generation for Situated Reference Resolution: An Empirical Study and Computational Model
Authors:
Felix Gervits,
Gordon Briggs,
Antonio Roque,
Genki A. Kadomatsu,
Dean Thurston,
Matthias Scheutz,
Matthew Marge
Abstract:
Dialogue agents that interact with humans in situated environments need to manage referential ambiguity across multiple modalities and ask for help as needed. However, it is not clear what kinds of questions such agents should ask nor how the answers to such questions can be used to resolve ambiguity. To address this, we analyzed dialogue data from an interactive study in which participants contro…
▽ More
Dialogue agents that interact with humans in situated environments need to manage referential ambiguity across multiple modalities and ask for help as needed. However, it is not clear what kinds of questions such agents should ask nor how the answers to such questions can be used to resolve ambiguity. To address this, we analyzed dialogue data from an interactive study in which participants controlled a virtual robot tasked with organizing a set of tools while engaging in dialogue with a live, remote experimenter. We discovered a number of novel results, including the distribution of question types used to resolve ambiguity and the influence of dialogue-level factors on the reference resolution process. Based on these empirical findings we: (1) developed a computational model for clarification requests using a decision network with an entropy-based utility assignment method that operates across modalities, (2) evaluated the model, showing that it outperforms a slot-filling baseline in environments of varying ambiguity, and (3) interpreted the results to offer insight into the ways that agents can ask questions to facilitate situated reference resolution.
△ Less
Submitted 12 October, 2021;
originally announced October 2021.
-
How Should Agents Ask Questions For Situated Learning? An Annotated Dialogue Corpus
Authors:
Felix Gervits,
Antonio Roque,
Gordon Briggs,
Matthias Scheutz,
Matthew Marge
Abstract:
Intelligent agents that are confronted with novel concepts in situated environments will need to ask their human teammates questions to learn about the physical world. To better understand this problem, we need data about asking questions in situated task-based interactions. To this end, we present the Human-Robot Dialogue Learning (HuRDL) Corpus - a novel dialogue corpus collected in an online in…
▽ More
Intelligent agents that are confronted with novel concepts in situated environments will need to ask their human teammates questions to learn about the physical world. To better understand this problem, we need data about asking questions in situated task-based interactions. To this end, we present the Human-Robot Dialogue Learning (HuRDL) Corpus - a novel dialogue corpus collected in an online interactive virtual environment in which human participants play the role of a robot performing a collaborative tool-organization task. We describe the corpus data and a corresponding annotation scheme to offer insight into the form and content of questions that humans ask to facilitate learning in a situated environment. We provide the corpus as an empirically-grounded resource for improving question generation in situated intelligent agents.
△ Less
Submitted 11 June, 2021;
originally announced June 2021.
-
Study of a Hybrid Photovoltaic-Wind Smart Microgrid using Data Science Approach
Authors:
Josimar Edinson Chire Saire,
José Armando Gastelo Roque,
Franco Canziani
Abstract:
In this paper, a smart microgrid implemented in Paracas, Ica, Peru, composed of 6kWp PV + 6kW Wind and that provides electricity to a rural community of 40 families, was studied using a data science approach. Real data of solar irradiance, wind speed, energy demand, and voltage of the battery bank from 2 periods of operation were studied to find patterns, seasonality, and existing correlations bet…
▽ More
In this paper, a smart microgrid implemented in Paracas, Ica, Peru, composed of 6kWp PV + 6kW Wind and that provides electricity to a rural community of 40 families, was studied using a data science approach. Real data of solar irradiance, wind speed, energy demand, and voltage of the battery bank from 2 periods of operation were studied to find patterns, seasonality, and existing correlations between the analyzed data. Among the main results are the periodicity of renewable resources and demand, the weekly behavior of electricity demand and how it has progressively increased from an average of 0.7kW in 2019 to 1.2kW in 2021, and how power outages are repeated at certain hours in the morning when resources are low or there is a failure in the battery bank. These analyzed data will be used to improve sizing techniques and provide recommendations for energy management to optimize the performance of smart microgrids.
△ Less
Submitted 13 May, 2021;
originally announced May 2021.
-
NetPyNE implementation and rescaling of the Potjans-Diesmanncortical microcircuit model
Authors:
Cecilia Romaro,
Fernando Araujo Najman,
William W Lytton,
Antonio C Roque,
Salvador Dura-Bernal
Abstract:
The Potjans-Diesmann cortical microcircuit model is a widely used model originallyimplemented in NEST. Here, we re-implemented the model using NetPyNE, a high-level Python interface to the NEURON simulator, and reproduced the findings of theoriginal publication. We also implemented a method for rescaling the network sizewhich preserves first and second order statistics, building on existing work o…
▽ More
The Potjans-Diesmann cortical microcircuit model is a widely used model originallyimplemented in NEST. Here, we re-implemented the model using NetPyNE, a high-level Python interface to the NEURON simulator, and reproduced the findings of theoriginal publication. We also implemented a method for rescaling the network sizewhich preserves first and second order statistics, building on existing work on networktheory. The new implementation enables using more detailed neuron models with mul-ticompartment morphologies and multiple biophysically realistic channels. This opensthe model to new research, including the study of dendritic processing, the influenceof individual channel parameters, and generally multiscale interactions in the network.The rescaling method provides flexibility to increase or decrease the network size ifrequired when running these more realistic simulations. Finally, NetPyNE facilitatesmodifying or extending the model using its declarative language; optimizing modelparameters; running efficient large-scale parallelized simulations; and analyzing themodel through built-in methods, including local field potential calculation and informa-tion flow measures.
△ Less
Submitted 7 May, 2020;
originally announced May 2020.
-
Engaging in Dialogue about an Agent's Norms and Behaviors
Authors:
Daniel Kasenberg,
Antonio Roque,
Ravenna Thielstrom,
Matthias Scheutz
Abstract:
We present a set of capabilities allowing an agent planning with moral and social norms represented in temporal logic to respond to queries about its norms and behaviors in natural language, and for the human user to add and remove norms directly in natural language. The user may also pose hypothetical modifications to the agent's norms and inquire about their effects.
We present a set of capabilities allowing an agent planning with moral and social norms represented in temporal logic to respond to queries about its norms and behaviors in natural language, and for the human user to add and remove norms directly in natural language. The user may also pose hypothetical modifications to the agent's norms and inquire about their effects.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
Generating Justifications for Norm-Related Agent Decisions
Authors:
Daniel Kasenberg,
Antonio Roque,
Ravenna Thielstrom,
Meia Chita-Tegmark,
Matthias Scheutz
Abstract:
We present an approach to generating natural language justifications of decisions derived from norm-based reasoning. Assuming an agent which maximally satisfies a set of rules specified in an object-oriented temporal logic, the user can ask factual questions (about the agent's rules, actions, and the extent to which the agent violated the rules) as well as "why" questions that require the agent co…
▽ More
We present an approach to generating natural language justifications of decisions derived from norm-based reasoning. Assuming an agent which maximally satisfies a set of rules specified in an object-oriented temporal logic, the user can ask factual questions (about the agent's rules, actions, and the extent to which the agent violated the rules) as well as "why" questions that require the agent comparing actual behavior to counterfactual trajectories with respect to these rules. To produce natural-sounding explanations, we focus on the subproblem of producing natural language clauses from statements in a fragment of temporal logic, and then describe how to embed these clauses into explanatory sentences. We use a human judgment evaluation on a testbed task to compare our approach to variants in terms of intelligibility, mental model and perceived trust.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
Prediction in Cyber Security: Complications and Consolations
Authors:
Antonio Roque
Abstract:
Uncertainty, error, and similar complications add to the many challenges of cyber security. Various disciplines have developed methods for managing these complications, but applying these methods involves disambiguating overlap** terminology and determining a method's proper usage in the context of cyber security, which has unique properties. This process is here guided by the need for predictio…
▽ More
Uncertainty, error, and similar complications add to the many challenges of cyber security. Various disciplines have developed methods for managing these complications, but applying these methods involves disambiguating overlap** terminology and determining a method's proper usage in the context of cyber security, which has unique properties. This process is here guided by the need for prediction, which is required for cyber security to become more like traditional sciences. A motivating malware analysis example is defined. A five-element ontology of complications for prediction is presented, and concepts from numerous disciplines are mapped to it in terms of the motivating example.
△ Less
Submitted 25 April, 2018; v1 submitted 23 April, 2018;
originally announced April 2018.
-
Validating Computer Security Methods: Meta-methodology for an Adversarial Science
Authors:
Antonio Roque
Abstract:
How can we justify the validity of our computer security methods? This meta-methodological question is related to recent explorations on the science of computer security, which have been hindered by computer security's unique properties. We confront this by develo** a taxonomy of properties and methods. Interdisciplinary foundations provide a solid grounding for a set of essential concepts, incl…
▽ More
How can we justify the validity of our computer security methods? This meta-methodological question is related to recent explorations on the science of computer security, which have been hindered by computer security's unique properties. We confront this by develo** a taxonomy of properties and methods. Interdisciplinary foundations provide a solid grounding for a set of essential concepts, including a decision tree for characterizing adversarial interaction. Several types of invalidation and general ways of addressing them are described for technical methods. An interdisciplinary argument from theory explains the role that meta-methodological validation plays in the adversarial science of computer security.
△ Less
Submitted 22 January, 2018; v1 submitted 3 October, 2017;
originally announced October 2017.