Mechanisms which add fault-tolerance to applications (e.g., through a virtual-machine hypervisor) incur network overhead.
When a superposition (textbackslash{}alpha]-textbackslash{}-alpha]) of two coherent states with opposite phase falls upon a 50-50 beam splitter, the resulting state is entangled.
In a secure multiparty computation (MPC) system, there are some sources, where each one has access to a private input.
We study how photon absorption losses degrade the bipartite entanglement of entangled states of light.
An example is given of an interaction that produces an infinite amount of entanglement in an infinitely short time, but only a finite amount in longer times.
Given a quantum state of the electromagnetic field, one is, in principle, free to redefine the field modes.
We consider entanglement for quantum states defined in vector spaces over the real numbers.
This paper surveys the kinds of profile data that are currently held in the various networks and where/how that data is stored, identifies key standards group activities working to enable profile d
The paper describes a business-driven enterprise network planning and design methodology that has an iterative structure to periodically assess, update, and extend the network architecture to suppo
Before a chapter discussing Enterprise Security Managemtn (ESM) can be written, an acceptable definition must be identified as a basis for further discussion.