Playing a quantum game with a corrupted source
نویسندگان
چکیده
منابع مشابه
Adversarial Source Identification Game with Corrupted Training
We study a variant of the source identification game with training data in which part of the training data is corrupted by an attacker. In the addressed scenario, the defender aims at deciding whether a test sequence has been drawn according to a discrete memoryless source X ∼ PX , whose statistics are known to him through the observation of a training sequence generated by X . In order to unde...
متن کاملPlaying a true Parrondo's game with a three state coin on a quantum walk
A coin with three states is not necessarily an anomaly. A coin falls on either of its two sides head or tail. However, there is a remote possibility that it may not fall but roll on its edge and get stuck somewhere without falling on either of its sides. This possibility is remote for a classical coin so much so that it is never analyzed. For a three state quantum coin(qutrit), this is a fact. ...
متن کاملGeneral Game Playing with Ants
General Game Playing (GGP) aims at developing game playing agents that are able to play a variety of games and, in the absence of pre-programmed game specific knowledge, become proficient players. The challenge of making such a player has led to various techniques being used to tackle the problem of game specific knowledge absence. Most GGP players have used standard tree-search techniques enha...
متن کاملLearning Recycling from Playing a Kinect Game
The emergence of gesture-based computing and inexpensive gesture recognition technology such as the Kinect have opened doors for a new generation of educational games. Gesture based-based interfaces make it possible to provide user interfaces that are more nature and closer to the tasks being carried out, and helping students that learn best through movement (compared to audio and vision). For ...
متن کاملA Scrabble Crossword Game Playing Program
A program that plays the SCRABBLE Crossword Game has oeen designed and implemented in SIMULA 67 on a DECSystem-10 and in Pascal on a CYBER 173. The heart of the design is the data struc- t u r e for the lexicon and the algorithm for searching i t. The lexicon is represented as a l e t t e r table, or t r i e using a canonical ordering of the letter s in the words rather than the o r i g i n a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2001
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.63.020302