Format results
-
-
The Measurement Postulates of Quantum Mechanics are Redundant
Lluis Masanes University College London
-
Closed strings, moduli and Integrability in AdS3/CFT2
Bogdan Stefanski University of London
-
-
Braided tensor categories and the cobordism hypothesis
David Jordan University of Edinburgh
-
-
Asymptotic performance of port-based teleportation
Felix Leditzky University of Illinois Urbana-Champaign
-
On the New Large D Limit of Matrix Models and Phases of Matrix Quantum Mechanics and SYK Models
Frank Ferrari Université Libre de Bruxelles
-
-
Aspects of approximate quantum error correction in holography
Isaac Kim University of California, Davis
-
-
Lensing reconstruction using line intensity maps
Simon Foreman Arizona State University
-
The war on general purpose computers is the war on science
Cory Doctorow Craphound
The general purpose computer can run any program we can express in
symbolic logic; that makes it the go-to tool for accomplishing any task
that can be reduced to a computable function, and that's why software is
eating the world and cars and colliders and airplanes and pacemakers and
toasters are all just turning into computers in fancy cases.
That also means that every policy problem we can imagine will eventually
involve a computer -- and thus involve a lawmaker insisting that it must
be possible to make a computer that can run every program except for
some program that creates a problem in the world.
We don't know how to make that computer, but we can approximate it by
creating a computer with some spyware-like program running on it that
checks to see whether you're running a "naughty" program and shuts it down.
That's a spider we swallow to catch a fly. Here's the bird we swallow to
catch the spider: laws like Canada's C-11 make it a crime to
investigate, circumvent, or point out defects in systems that have these
spyware-like processes.
Companies have noticed that this offers some real upsides for them: they
can use these spyware-like processes to prevent users their customers
from using their own consumables (e.g. printer ink), parts, service
depots, apps -- anything that the company can command a high margin on,
provided that it's illegal for a customer to choose someone else's products.
What a deadly combination: companies are rapidly expanding the
constellation of devices that are locked in this way, and once a device
is locked in this way, it can't be investigated, its defects can't be
disclosed, and it can't be modified to improve it, mitigate its flaws,
and protects its owner from cybersecurity risk.
Peer review exists out of recognition that there is no way to know if
you're right until you let your enemies try to prove you wrong; in
creating a monopolistic right to control the use of products after they
were sold, Parliament also created the right for companies to enjoin the
most fundamental task of scientific knowledge creation: finding mistakes
and pointing them out.
This is urgent: our world is made of computers, those computers are
designed to treat their owners as their enemies, and security
researchers can't audit those computers without risking civil and
criminal reprisals. That's a catastrophe in the making. -
The Measurement Postulates of Quantum Mechanics are Redundant
Lluis Masanes University College London
In order to think about the foundations of physics it is important to understand the logical relationships among the physical principles that sustain the building. As part of these axioms of physics there is the core hypothesis that, how the Universe is partitioned into systems and subsystems is a subjective choice of the observer that should not affect the predictions of physics. Other foundational principles are the Postulates of Quantum Mechanics. However, we prove that these are not independent from the “independence of subsystem partitioning” hypothesis described above. In particular, we prove that the mathematical structure of quantum measurements and the formula for assigning outcome probabilities are implied by the mentioned hypothesis and the rest of quantum postulates.
-
Closed strings, moduli and Integrability in AdS3/CFT2
Bogdan Stefanski University of London
I will review recent progress in computing the exact planar spectrum of closed strings in
AdS3 backgrounds with 8+8 supercharges, including the derivation of the protected spectrum.
Such theories have a multi-dimensional moduli space, and I will show what effect varying
the moduli has on the exact closed string spectrum, and how the integrable structure changes
as we do so, paying particular attention to the background supported by NS-NS flux. -
Probing Ultralight Bosons with Binary Black Holes
Ultralight bosons exist in various proposed extensions to the Standard Model, which can form condensates around rapidly rotating black holes through a process called superradiance. These boson clouds have many interesting observational consequences, such as the continuous emission of monochromatic gravitational waves. In this talk, I will describe the dynamics of the system when it is part of a binary black hole. I will show that the presence of a binary companion greatly enriches the evolution of the boson clouds, most remarkably through the existence of resonant transitions between growing and decaying modes of the clouds. Finally, I will sketch some phenomenological consequences, both for the gravitational waves emitted by the clouds and the finite-size effects imprinted in the waveforms of the binary signal.
-
Braided tensor categories and the cobordism hypothesis
David Jordan University of Edinburgh
The cobordism hypothesis gives a functorial bijection between oriented
n-dimensional fully local topological field theories, valued in some
higher category C, and the fully dualizable object of C equipped with
the structure of SO(n)-fixed point. In this talk I'll explain recent
works of Haugseng, Johnson-Freyd and Scheimbauer which construct a
Morita 4-category of braided tensor categories, and I'll report on joint
work with Brochier and Snyder which identifies two natural subcategories
therein which are 3- and 4-dualizable. These are the rigid braided
tensor categories with enough compact projectives, and the braided
fusion categories, respectively. I'll also explain work in progress by
us to construct SO(3)- and SO(4)-fixed point structures in each case,
starting from ribbon and pre-modular categories, respectively.
Applying the cobordism hypothesis, we obtain 3- and 4-dimensional fully
local TFT's, which extend the 2-dimensional TFT's we constructed with
Ben-Zvi and Brochier, and which conjecturally relate to a number of
constructions in the literature, including: skein modules, quantum
A-polynomials, Crane-Kauffmann-Yetter invariants; hence our construction
puts these on firm foundational grounds as fully local TFT's. A key
feature of our construction in dimension 3 is that we require the input
braided tensor category neither to be finite, nor semi-simple, so this
opens up new examples -- such as non-modularized quantum groups at roots
of unity -- which were not obtainable by earlier methods.
-
-
Asymptotic performance of port-based teleportation
Felix Leditzky University of Illinois Urbana-Champaign
Port-based teleportation (PBT) is a variant of the well-known task of quantum teleportation in which Alice and Bob share multiple entangled states called "ports". While in the standard teleportation protocol using a single entangled state the receiver Bob has to apply a non-trivial correction unitary, in PBT he merely has to pick up the right quantum system at a port specified by the classical message he received from Alice. PBT has applications in instantaneous non-local computation and can be used to attack position-based quantum cryptography. Since perfect PBT protocols are impossible, there is a trade-off between error and entanglement consumption (or the number of ports), which can be analyzed using representation theory of the symmetric and unitary groups. In particular, without loss of generality the resource state can be assumed to have a “purified" Schur-Weyl duality symmetry. I will give an introduction to the task of PBT and its symmetries, and show how the asymptotics of existing formulas for the optimal performance for a given number of ports can be derived using a connection between representation theory and the Gaussian unitary ensemble.
Joint work with M. Christandl, C. Majenz, G. Smith, F. Speelman & M. Walter
-
On the New Large D Limit of Matrix Models and Phases of Matrix Quantum Mechanics and SYK Models
Frank Ferrari Université Libre de Bruxelles
In the first part of the talk, I will describe the new large N limit of tensor models, based on the “index” of graphs (in contrast to the standard large N expansion based on the “degree”), and the associated new large D limit of matrix models. This new limit sheds an interesting light on the relation between disordered models à la SYK, tensor models and black holes. In the second part of the talk, I will apply these ideas to discuss the phase diagrams of some strongly coupled matrix quantum mechanics. The phase diagrams display many interesting features, including first and second order phase transitions and quantum critical points. Some of these phase transitions can be argued to provide a quantum mechanical description of the phenomenon of gravitational collapse.
-
Extracting information from LIGO/Virgo observations of compact binaries, from determining the final state to constraining properties of black hole mimickers
Nathan Johnson-McDaniel University of Cambridge
Detections of compact binary coalescences with Advanced LIGO and Advanced Virgo are now starting to become routine. However, thereis still considerably more information that can be gleaned from these observations, particularly as detector sensitivity and waveform modelsboth improve. We start by describing the methods currently used in LIGO/Virgo data analysis to determine the mass and spin of the remnant black hole of the binary black hole coalescences. These black holes have the most well-measured masses and spins of any stellar-mass black holes observed and comparable or better mass accuracies to Sgr A*. We also describe the method used to obtain a lower bound on the radiated energy of the binary neutron star coalescence GW170817, and discuss further information one can extract from these observations by postprocessing parameter estimation results. We also describe a method for placing constraints on properties of black hole mimickers, such as boson stars or gravastars, if binaries of these objects are to produce the signals identified as coming from binary black holes. We present initial results of the method applied to injections in simulated noise, and as a proof of principle show how it is possible to rule out or constrain the properties of a specific model of boson stars using a given detection.
-
Aspects of approximate quantum error correction in holography
Isaac Kim University of California, Davis
Several equivalent formulations of quantum error correction condition will be introduced. Subtleties arise
when the error correction conditions hold only approximately. We will discuss an equivalent formulation that is
robust to the approximation error. One can leverage this tool to derive the existence of approximate quantum
error correcting code at low energy subspace of CFT that reproduces aspects of the holographic quantum error
correcting code. Using the same tool, we observe that two operators with greatly differing complexity approximately
commute in an appropriate code subspace. This leads to a notion of bulk locality in the entanglement shadow,
but the precise definition of complexity seems to play an important role in determining how well these operators commute
in the subspace.
-
8d gauge anomalies and the topological Green-Schwarz mechanism
Iñaki García-Etxebarria Durham University
String theory provides us with 8d supersymmetric gauge theories with gauge algebras su(N), so(2N), sp(N), e_6, e_7 and e_8, but no construction for so(2N+1), f_4 and g_2 is known. If string theory is universal in 8 dimensions, this pattern requires explanation. I will show that the theories for f_4 and so(2N+1) have a global gauge anomaly in flat space, while g_2 does not have it. Surprisingly, we also find that the sp(N) theories, arising from example from O7^+ planes in string theory, have a subtler gauge anomaly. This subtler anomaly, in contrast to the one in flat space, could in principle be canceled by a topological analogue of the Green-Schwarz mechanism. I will discuss one simple example of such a generalized anomaly cancellation mechanism in three dimensions, and then explain why the generalized Green-Schwarz term required in 8 dimensions to make the O7^+ consistent is necessarily a more subtle generalization of a Chern-Simons coupling
-
Lensing reconstruction using line intensity maps
Simon Foreman Arizona State University
Gravitational lensing of the cosmic microwave background has emerged as a powerful cosmological probe, made possible by the development and characterization of nearly-optimal estimators for extracting the lensing signal from temperature and polarization maps. One can ask whether similar tools can be applied to upcoming "intensity maps" of emission lines at other wavelengths (e.g. 21cm). In this talk, I will present recent work in this direction, focusing in particular on the impact of gravitational nonlinearities on standard quadratic lensing estimators. I will show how these nonlinearities can provide a significant contaminant to lensing reconstruction, even for observations at reionization-era redshifts, but will also describe how this contamination can largely be mitigated by modifying the lensing estimator. Finally, I will present estimates for the detectability of lensing in ongoing and future intensity mapping surveys.