ﻻ يوجد ملخص باللغة العربية
We estimate, from first-principles, the rate of inter-party avalanche involvements. The model suggests that the likelihood of inter-party involvements is quadratic in the density of parties -- twice as many parties quadruples the likelihood. The model predicts that when the product of the party-density and the area of a days potential avalanches approaches one, inter-party avalanche involvements will become a substantial fraction of all avalanche involvements. As a corollary, the relative rate of inter-party involvements is expected to increase with avalanche size. We argue, with selected North American inter-party incidents from 2001-2019, that inter-party involvements are a timely concern. To spur conversation, we enumerate a variety of strategies that may mitigate inter-party hazard.
We measure polarization in the United States Congress using the network science concept of modularity. Modularity provides a conceptually-clear measure of polarization that reveals both the number of relevant groups and the strength of inter-group di
We consider the problem of decorrelating states of coupled quantum systems. The decorrelation can be seen as separation of quantum signals, in analogy to the classical problem of signal-separation rising in the so-called cocktail-party context. The s
Bipartite matching problem is to study two disjoint groups of agents who need to be matched pairwise. It can be applied to many real-world scenarios and explain many social phenomena. In this article, we study the effect of competition on bipartite m
We initiate the study of multi-party computation for classical functionalities (in the plain model) with security against malicious polynomial-time quantum adversaries. We observe that existing techniques readily give a polynomial-round protocol, but
We consider the task of secure multi-party distributed quantum computation on a quantum network. We propose a protocol based on quantum error correction which reduces the number of necessary qubits. That is, each of the $n$ nodes in our protocol requ