6,559 results on '"Pistoia A"'
Search Results
2. Non-Variational Quantum Random Access Optimization with Alternating Operator Ansatz
- Author
-
He, Zichang, Raymond, Rudy, Shaydulin, Ruslan, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Emerging Technologies - Abstract
Solving hard optimization problems is one of the most promising application domains for quantum computers due to the ubiquity of such problems in industry and the availability of broadly applicable quantum speedups. However, the ability of near-term quantum computers to tackle industrial-scale optimization problems is limited by their size and the overheads of quantum error correction. Quantum Random Access Optimization (QRAO) has been proposed to reduce the space requirements of quantum optimization. However, to date QRAO has only been implemented using variational algorithms, which suffer from the need to train instance-specific variational parameters, making them difficult to scale. We propose and benchmark a non-variational approach to QRAO based on the Quantum Alternating Operator Ansatz (QAOA) for the MaxCut problem. We show that instance-independent ``fixed'' parameters achieve good performance, removing the need for variational parameter optimization. Additionally, we evaluate different design choices, such as various mixers and initial states, as well as QAOA operator implementations when customizing for QRAO, and identify a strategy that performs well in practice. Our results pave the way for the practical execution of QRAO on early fault-tolerant quantum computers., Comment: 8 pages, 8 figures
- Published
- 2025
3. Private, Auditable, and Distributed Ledger for Financial Institutes
- Author
-
Eloul, Shaltiel, Satsangi, Yash, Zhu, Yeoh Wei, Amer, Omar, Papadopoulos, Georgios, and Pistoia, Marco
- Subjects
Computer Science - Cryptography and Security - Abstract
Distributed ledger technology offers several advantages for banking and finance industry, including efficient transaction processing and cross-party transaction reconciliation. The key challenges for adoption of this technology in financial institutes are (a) the building of a privacy-preserving ledger, (b) supporting auditing and regulatory requirements, and (c) flexibility to adapt to complex use-cases with multiple digital assets and actors. This paper proposes a framework for a private, audit-able, and distributed ledger (PADL) that adapts easily to fundamental use-cases within financial institutes. PADL employs widely-used cryptography schemes combined with zero-knowledge proofs to propose a transaction scheme for a `table' like ledger. It enables fast confidential peer-to-peer multi-asset transactions, and transaction graph anonymity, in a no-trust setup, but with customized privacy. We prove that integrity and anonymity of PADL is secured against a strong threat model. Furthermore, we showcase three fundamental real-life use-cases, namely, an assets exchange ledger, a settlement ledger, and a bond market ledger. Based on these use-cases we show that PADL supports smooth-lined inter-assets auditing while preserving privacy of the participants. For example, we show how a bank can be audited for its liquidity or credit risk without violation of privacy of itself or any other party, or how can PADL ensures honest coupon rate payment in bond market without sharing investors values. Finally, our evaluation shows PADL's advantage in performance against previous relevant schemes.
- Published
- 2025
4. Quantum Compilation Toolkit for Rydberg Atom Arrays with Implications for Problem Hardness and Quantum Speedups
- Author
-
Schuetz, Martin J. A., Andrist, Ruben S., Salton, Grant, Yalovetzky, Romina, Raymond, Rudy, Sun, Yue, Acharya, Atithi, Chakrabarti, Shouvanik, Pistoia, Marco, and Katzgraber, Helmut G.
- Subjects
Quantum Physics ,Condensed Matter - Disordered Systems and Neural Networks ,Condensed Matter - Quantum Gases ,Physics - Atomic Physics - Abstract
We propose and implement a comprehensive quantum compilation toolkit for solving the maximum independent set (MIS) problem on quantum hardware based on Rydberg atom arrays. Our end-to-end pipeline involves three core components to efficiently map generic MIS instances onto Rydberg arrays with unit-disk connectivity, with modules for graph reduction, hardware compatibility checks, and graph embedding. The first module (reducer) provides hardware-agnostic and deterministic reduction logic that iteratively reduces the problem size via lazy clique removals. We find that real-world networks can typically be reduced by orders of magnitude on sub-second time scales, thus significantly cutting down the eventual load for quantum devices. Moreover, we show that reduction techniques may be an important tool in the ongoing search for potential quantum speedups, given their ability to identify hard problem instances. In particular, for Rydberg-native MIS instances, we observe signatures of an easy-hard-easy transition and quantify a critical degree indicating the onset of a hard problem regime. The second module (compatibility checker) implements a hardware compatibility checker that quickly determines whether or not a given input graph may be compatible with the restrictions imposed by Rydberg quantum hardware. The third module (embedder) describes hardware-efficient graph embedding routines to generate (approximate) encodings with controllable overhead and optimized ancilla placements. We exemplify our pipeline with experiments run on the QuEra Aquila device available on Amazon Braket. In aggregate, our work provides a set of tools that extends the class of problems that can be tackled with near-term Rydberg atom arrays., Comment: Manuscript: 20 pages, 16 figures. Appendix: 1 page, 3 figures
- Published
- 2024
5. Self-testing quantum randomness expansion on an integrated photonic chip
- Author
-
Zhang, Gong, Primaatmaja, Ignatius William, Chen, Yue, Ng, Si Qi, Ng, Hong Jie, Pistoia, Marco, Gong, Xiao, Goh, Koon Tong, Wang, Chao, and Lim, Charles
- Subjects
Quantum Physics - Abstract
The power of quantum random number generation is more than just the ability to create truly random numbers$\unicode{x2013}$it can also enable self-testing, which allows the user to verify the implementation integrity of certain critical quantum components with minimal assumptions. In this work, we develop and implement a self-testing quantum random number generator (QRNG) chipset capable of generating 15.33 Mbits of certifiable randomness in each run (an expansion rate of $5.11\times 10^{-4}$ at a repetition rate of 10 Mhz). The chip design is based on a highly loss-and-noise tolerant measurement-device-independent protocol, where random coherent states encoded using quadrature phase shift keying are used to self-test the quantum homodyne detection unit: well-known to be challenging to characterise in practice. Importantly, this proposal opens up the possibility to implement miniaturised self-testing QRNG devices at production scale using standard silicon photonics foundry platforms., Comment: 15 Pages, 5 Figures, and 2 Tables
- Published
- 2024
6. Multiple solutions to a semilinear elliptic equation with a sharp change of sign in the nonlinearity
- Author
-
Clapp, Mónica, Pistoia, Angela, and Saldaña, Alberto
- Subjects
Mathematics - Analysis of PDEs ,35B44 - Abstract
We consider a nonautonomous semilinear elliptic problem where the power nonlinearity is multiplied by a discontinuous coefficient that equals one inside a bounded open set $\Omega$ and it equals minus one in its complement. In the slightly subcritical regime, we prove the existence of concentrating positive and nodal solutions. Moreover, depending on the geometry of $\Omega$, we establish multiplicity of positive solutions. Finally, in the critical case, we show the existence of a blow-up positive solution when $\Omega$ has nontrivial topology. Our proofs rely on a Lyapunov-Schmidt reduction strategy which in these problems turns out to be remarkably simple. We take this opportunity to highlight certain aspects of the method that are often overlooked and present it in a more accessible and detailed manner for nonexperts., Comment: 31 pages
- Published
- 2024
7. Blowing-up solutions to competitive critical systems in dimension 3
- Author
-
Fernández, Antonio J., Medina, María, and Pistoia, Angela
- Subjects
Mathematics - Analysis of PDEs ,35J47, 35B33 - Abstract
We study the critical system of $m\geq 2$ equations \begin{equation*} -\Delta u_i = u_i^5 + \sum_{j = 1,\,j\neq i}^m \beta_{ij} u_i^2 u_j^3\,, \quad u_i \gneqq 0 \quad \mbox{in } \mathbb{R}^3\,, \quad i \in \{1, \ldots, m\}\,, \end{equation*} where $\beta_{\kappa\ell} =\alpha\in\mathbb{R}$ if $\kappa\neq\ell$, and $\beta_{\ell m}=\beta_{m \kappa} =\beta<0$, for $ \kappa, \ell \in \{1,\ldots, m-1\}$. We construct solutions to this system in the case where $\beta\to-\infty$ by means of a Ljapunov-Schmidt reduction argument. This allows us to identify the explicit form of the solution at main order: $u_1$ will look like a perturbation of the standard radial positive solution to the Yamabe equation, while $u_2$ will blow-up at the $k$ vertices of a regular planar polygon. The solutions to the other equations will replicate the blowing-up structure under an appropriate rotation that ensures $u_i\neq u_j$ for $i\neq j$. The result provides the first almost-explicit example of non-synchronized solutions to competitive critical systems in dimension 3.
- Published
- 2024
8. Generalized Short Path Algorithms: Towards Super-Quadratic Speedup over Markov Chain Search for Combinatorial Optimization
- Author
-
Chakrabarti, Shouvanik, Herman, Dylan, Ozgul, Guneykan, Zhu, Shuchen, Augustino, Brandon, Hao, Tianyi, He, Zichang, Shaydulin, Ruslan, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Data Structures and Algorithms ,Mathematics - Optimization and Control - Abstract
We analyze generalizations of algorithms based on the short-path framework first proposed by Hastings [Quantum 2, 78 (2018)], which has been extended and shown by Dalzell et al. [STOC '22] to achieve super-Grover speedups for certain binary optimization problems. We demonstrate that, under some commonly satisfied technical conditions, an appropriate generalization can achieve super-quadratic speedups not only over unstructured search but also over a classical optimization algorithm that searches for the optimum by drawing samples from the stationary distribution of a Markov Chain. We employ this framework to obtain algorithms for problems including variants of Max-Bisection, Max Independent Set, the Ising Model, and the Sherrington Kirkpatrick Model, whose runtimes are asymptotically faster than those obtainable from previous short path techniques. For random regular graphs of sufficiently high degree, our algorithm is super-quadratically faster than the best rigorously proven classical runtimes for regular graphs. Our results also shed light on the quantum nature of short path algorithms, by identifying a setting where our algorithm is super-quadratically faster than any polynomial time Gibbs sampler, unless NP = RP. We conclude the paper with a numerical analysis that guides the choice of parameters for short path algorithms and raises the possibility of super-quadratic speedups in settings that are currently beyond our theoretical analysis.
- Published
- 2024
9. Certified Randomness implies Secure Classical Position-Verification
- Author
-
Amer, Omar, Chakraborty, Kaushik, Cui, David, Kaleoglu, Fatih, Lim, Charles, Liu, Minzhao, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security - Abstract
Liu et al. (ITCS22) initiated the study of designing a secure position verification protocol based on a specific proof of quantumness protocol and classical communication. In this paper, we study this interesting topic further and answer some of the open questions that are left in that paper. We provide a new generic compiler that can convert any single round proof of quantumness-based certified randomness protocol to a secure classical communication-based position verification scheme. Later, we extend our compiler to different kinds of multi-round proof of quantumness-based certified randomness protocols. Moreover, we instantiate our compiler with a random circuit sampling (RCS)-based certified randomness protocol proposed by Aaronson and Hung (STOC 23). RCS-based techniques are within reach of today's NISQ devices; therefore, our design overcomes the limitation of the Liu et al. protocol that would require a fault-tolerant quantum computer to realize. Moreover, this is one of the first cryptographic applications of RCS-based techniques other than certified randomness., Comment: v2: minor changes to related work and addition of acknowledgements. 54 pages, 10 figures, 1 table
- Published
- 2024
10. Quantum Authenticated Key Expansion with Key Recycling
- Author
-
Kon, Wen Yu, Chu, Jefferson, Loh, Kevin Han Yong, Alia, Obada, Amer, Omar, Pistoia, Marco, Chakraborty, Kaushik, and Lim, Charles
- Subjects
Quantum Physics - Abstract
Data privacy and authentication are two main security requirements for remote access and cloud services. While QKD has been explored to address data privacy concerns, oftentimes its use is separate from the client authentication protocol despite implicitly providing authentication. Here, we present a quantum authentication key expansion (QAKE) protocol that (1) integrates both authentication and key expansion within a single protocol, and (2) provides key recycling property -- allowing all authentication keys to be reused. We analyse the security of the protocol in a QAKE framework adapted from a classical authentication key exchange (AKE) framework, providing separate security conditions for authentication and data privacy. An experimental implementation of the protocol, with appropriate post-selection, was performed to demonstrate its feasibility., Comment: 71 pages, comments are welcome
- Published
- 2024
11. Performance of Quantum Approximate Optimization with Quantum Error Detection
- Author
-
He, Zichang, Amaro, David, Shaydulin, Ruslan, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Emerging Technologies - Abstract
Quantum algorithms must be scaled up to tackle real-world applications. Doing so requires overcoming the noise present on today's hardware. The quantum approximate optimization algorithm (QAOA) is a promising candidate for scaling up due to its modest resource requirements and documented asymptotic speedup over state-of-the-art classical algorithms for some problems. However, achieving better-than-classical performance with QAOA is believed to require fault tolerance. In this paper, we demonstrate a partially fault-tolerant implementation of QAOA using the $[[k+2,k,2]]$ ``Iceberg'' error detection code. We observe that encoding the circuit with the Iceberg code improves the algorithmic performance as compared to the unencoded circuit for problems with up to $20$ logical qubits on a trapped-ion quantum computer. Additionally, we propose and calibrate a model for predicting the code performance, and use it to characterize the limits of the Iceberg code and extrapolate its performance to future hardware with improved error rates. In particular, we show how our model can be used to determine necessary conditions for QAOA to outperform Goemans-Williamson algorithm on future hardware. Our results demonstrate the largest universal quantum computing algorithm protected by partially fault-tolerant quantum error detection on practical applications to date, paving the way towards solving real-world applications with quantum computers., Comment: 13 + 4 pages, 12 figures, 7 tables
- Published
- 2024
12. Decomposition Pipeline for Large-Scale Portfolio Optimization with Applications to Near-Term Quantum Computing
- Author
-
Acharya, Atithi, Yalovetzky, Romina, Minssen, Pierre, Chakrabarti, Shouvanik, Shaydulin, Ruslan, Raymond, Rudy, Sun, Yue, Herman, Dylan, Andrist, Ruben S., Salton, Grant, Schuetz, Martin J. A., Katzgraber, Helmut G., and Pistoia, Marco
- Subjects
Mathematics - Optimization and Control ,Physics - Data Analysis, Statistics and Probability ,Quantitative Finance - Portfolio Management ,Quantitative Finance - Risk Management ,Quantum Physics - Abstract
Industrially relevant constrained optimization problems, such as portfolio optimization and portfolio rebalancing, are often intractable or difficult to solve exactly. In this work, we propose and benchmark a decomposition pipeline targeting portfolio optimization and rebalancing problems with constraints. The pipeline decomposes the optimization problem into constrained subproblems, which are then solved separately and aggregated to give a final result. Our pipeline includes three main components: preprocessing of correlation matrices based on random matrix theory, modified spectral clustering based on Newman's algorithm, and risk rebalancing. Our empirical results show that our pipeline consistently decomposes real-world portfolio optimization problems into subproblems with a size reduction of approximately 80%. Since subproblems are then solved independently, our pipeline drastically reduces the total computation time for state-of-the-art solvers. Moreover, by decomposing large problems into several smaller subproblems, the pipeline enables the use of near-term quantum devices as solvers, providing a path toward practical utility of quantum computers in portfolio optimization.
- Published
- 2024
13. On the Relativistic Zero Knowledge Quantum Proofs of Knowledge
- Author
-
Shi, Kaiyan, Chakraborty, Kaushik, Kon, Wen Yu, Amer, Omar, Pistoia, Marco, and Lim, Charles
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security - Abstract
We initiate the study of relativistic zero-knowledge quantum proof of knowledge systems with classical communication, formally defining a number of useful concepts and constructing appropriate knowledge extractors for all the existing protocols in the relativistic setting which satisfy a weaker variant of the special soundness property due to Unruh (EUROCRYPT 2012). We show that there exists quantum proofs of knowledge with knowledge error 1/2 + negl({\eta}) for all relations in NP via a construction of such a system for the Hamiltonian cycle relation using a general relativistic commitment scheme exhibiting the fairly-binding property due to Fehr and Fillinger (EUROCRYPT 2016). We further show that one can construct quantum proof of knowledge extractors for proof systems which do not exhibit special soundness, and therefore require an extractor to rewind multiple times. We develop a new multi-prover quantum rewinding technique by combining ideas from monogamy of entanglement and gentle measurement lemmas that can break the quantum rewinding barrier. Finally, we prove a new bound on the impact of consecutive measurements and use it to significantly improve the soundness bound of some existing relativistic zero knowledge proof systems, such as the one due to Chailloux and Leverrier (EUROCRYPT 2017)., Comment: 38 pages
- Published
- 2024
14. Sign-Changing Solutions for the One-Dimensional Non-Local sinh-Poisson Equation
- Author
-
DelaTorre Azahara, Mancini Gabriele, and Pistoia Angela
- Subjects
fractional laplacian ,exponential non-linearities ,non-local ,corrosion modelling ,lyapunov–schmidt reduction ,one-dimension ,sign-changing ,35r11 ,35j61 ,35b44 ,35b38 ,35b40 ,Mathematics ,QA1-939 - Abstract
We study the existence of sign-changing solutions for a non-local version of the sinh-Poisson equation on a bounded one-dimensional interval I, under Dirichlet conditions in the exterior of I. This model is strictly related to the mathematical description of galvanic corrosion phenomena for simple electrochemical systems. By means of the finite-dimensional Lyapunov–Schmidt reduction method, we construct bubbling families of solutions developing an arbitrarily prescribed number sign-alternating peaks. With a careful analysis of the limit profile of the solutions, we also show that the number of nodal regions coincides with the number of blow-up points.
- Published
- 2020
- Full Text
- View/download PDF
15. Parameter Setting Heuristics Make the Quantum Approximate Optimization Algorithm Suitable for the Early Fault-Tolerant Era
- Author
-
He, Zichang, Shaydulin, Ruslan, Herman, Dylan, Li, Changhao, Raymond, Rudy, Sureshbabu, Shree Hari, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Emerging Technologies - Abstract
Quantum Approximate Optimization Algorithm (QAOA) is one of the most promising quantum heuristics for combinatorial optimization. While QAOA has been shown to perform well on small-scale instances and to provide an asymptotic speedup over state-of-the-art classical algorithms for some problems, fault-tolerance is understood to be required to realize this speedup in practice. The low resource requirements of QAOA make it particularly suitable to benchmark on early fault-tolerant quantum computing (EFTQC) hardware. However, the performance of QAOA depends crucially on the choice of the free parameters in the circuit. The task of setting these parameters is complicated in the EFTQC era by the large overheads, which preclude extensive classical optimization. In this paper, we summarize recent advances in parameter setting in QAOA and show that these advancements make EFTQC experiments with QAOA practically viable., Comment: 7 pages, an invited paper at ICCAD 2024 "Exploring Quantum Technologies in Practical Applications" special session
- Published
- 2024
16. End-to-End Protocol for High-Quality QAOA Parameters with Few Shots
- Author
-
Hao, Tianyi, He, Zichang, Shaydulin, Ruslan, Larson, Jeffrey, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Emerging Technologies - Abstract
The quantum approximate optimization algorithm (QAOA) is a quantum heuristic for combinatorial optimization that has been demonstrated to scale better than state-of-the-art classical solvers for some problems. For a given problem instance, QAOA performance depends crucially on the choice of the parameters. While average-case optimal parameters are available in many cases, meaningful performance gains can be obtained by fine-tuning these parameters for a given instance. This task is especially challenging, however, when the number of circuit executions (shots) is limited. In this work, we develop an end-to-end protocol that combines multiple parameter settings and fine-tuning techniques. We use large-scale numerical experiments to optimize the protocol for the shot-limited setting and observe that optimizers with the simplest internal model (linear) perform best. We implement the optimized pipeline on a trapped-ion processor using up to 32 qubits and 5 QAOA layers, and we demonstrate that the pipeline is robust to small amounts of hardware noise. To the best of our knowledge, these are the largest demonstrations of QAOA parameter fine-tuning on a trapped-ion processor in terms of 2-qubit gate count., Comment: 14 pages, 13 figures, fix minor typos
- Published
- 2024
17. New solutions for the Lane-Emden problem on planar domains
- Author
-
Battaglia, Luca, Ianni, Isabella, and Pistoia, Angela
- Subjects
Mathematics - Analysis of PDEs ,35J25, 35B40, 35B44 - Abstract
We consider the Lane-Emden problem on planar domains. When the exponent is large, the existence and multiplicity of solutions strongly depend on the geometric properties of the domain, which also deeply affect their qualitative behavior. Remarkably, a wide variety of solutions, both positive and sign-changing, have been found when the exponent is sufficiently large. In this paper, we focus on this topic and fine new sign-changing solutions that exhibit an unexpected concentration phenomenon as the exponent approaches infinity., Comment: 41 pages
- Published
- 2024
18. Bubble solution for the critical Hartree equation in pierced domain
- Author
-
Ghimenti, Marco, Huang, Xiaomeng, and Pistoia, Angela
- Subjects
Mathematics - Analysis of PDEs - Abstract
In this article, we establish the existence of solutions to the following critical Hartree equation \begin{align*} \begin{cases} -\Delta u=\left(\int_{\Omega_\varepsilon}\frac{u^{2_{\mu}^*}}{|x-y|^{\mu}}dy\right)u^{2_{\mu}^*-1}, &\text{ in } \Omega_\varepsilon, \\ u=0, &\text{ on } \partial\Omega_\varepsilon, \end{cases} \end{align*} where $2_{\mu}^*=\frac{2N-\mu}{N-2}$ is the upper critical exponent in the sense of the Hardy-Littlewood-Sobolev inequality, $N\geq 5$, $0<\mu<4$ with $\mu$ sufficiently close to $0$, $\Omega_\varepsilon:=\Omega\backslash B(0,\varepsilon)$ and $\Omega$ is a bounded smooth domain in $\mathbb{R}^N$, which contains the origin, and $\varepsilon$ is a positive parameter. As $\varepsilon$ goes to zero, we construct bubble solution which blows up at the origin.
- Published
- 2024
19. On a critical Hamiltonian system with Neumann boundary conditions
- Author
-
Pistoia, Angela and Schiera, Delia
- Subjects
Mathematics - Analysis of PDEs - Abstract
We consider the Hamiltonian system with Neumann boundary conditions: \[ -\Delta u + \mu u=v^{q }, \quad -\Delta v+ \mu v=u^{p} \quad \text{ in $\Omega$}, \qquad u, v >0 \quad \text{ in $\Omega$,} \qquad \partial_\nu u= \partial_\nu v=0 \quad \text{ on $\partial \Omega$, } \] where $\mu >0$ is a parameter and $\Omega$ is a smooth bounded domain in $\mathbb R^N .$ When $(p, q)$ approaches from below the critical hyperbola $N/(p+1) + N/(q+1)=N-2$, we build a solution which blows-up at a boundary point where the mean curvature achieves its minimum and negative value.
- Published
- 2024
20. QC-Forest: a Classical-Quantum Algorithm to Provably Speedup Retraining of Random Forest
- Author
-
Yalovetzky, Romina, Kumar, Niraj, Li, Changhao, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Machine Learning - Abstract
Random Forest (RF) is a popular tree-ensemble method for supervised learning, prized for its ease of use and flexibility. Online RF models require to account for new training data to maintain model accuracy. This is particularly important in applications where data is periodically and sequentially generated over time in data streams, such as auto-driving systems, and credit card payments. In this setting, performing periodic model retraining with the old and new data accumulated is beneficial as it fully captures possible drifts in the data distribution over time. However, this is unpractical with state-of-the-art classical algorithms for RF as they scale linearly with the accumulated number of samples. We propose QC-Forest, a classical-quantum algorithm designed to time-efficiently retrain RF models in the streaming setting for multi-class classification and regression, achieving a runtime poly-logarithmic in the total number of accumulated samples. QC-Forest leverages Des-q, a quantum algorithm for single tree construction and retraining proposed by Kumar et al. by expanding to multi-class classification, as the original proposal was limited to binary classes, and introducing an exact classical method to replace an underlying quantum subroutine incurring a finite error, while maintaining the same poly-logarithmic dependence. Finally, we showcase that QC-Forest achieves competitive accuracy in comparison to state-of-the-art RF methods on widely used benchmark datasets with up to 80,000 samples, while significantly speeding up the model retrain.
- Published
- 2024
21. The computational power of random quantum circuits in arbitrary geometries
- Author
-
DeCross, Matthew, Haghshenas, Reza, Liu, Minzhao, Rinaldi, Enrico, Gray, Johnnie, Alexeev, Yuri, Baldwin, Charles H., Bartolotta, John P., Bohn, Matthew, Chertkov, Eli, Cline, Julia, Colina, Jonhas, DelVento, Davide, Dreiling, Joan M., Foltz, Cameron, Gaebler, John P., Gatterman, Thomas M., Gilbreth, Christopher N., Giles, Joshua, Gresh, Dan, Hall, Alex, Hankin, Aaron, Hansen, Azure, Hewitt, Nathan, Hoffman, Ian, Holliman, Craig, Hutson, Ross B., Jacobs, Trent, Johansen, Jacob, Lee, Patricia J., Lehman, Elliot, Lucchetti, Dominic, Lykov, Danylo, Madjarov, Ivaylo S., Mathewson, Brian, Mayer, Karl, Mills, Michael, Niroula, Pradeep, Pino, Juan M., Roman, Conrad, Schecter, Michael, Siegfried, Peter E., Tiemann, Bruce G., Volin, Curtis, Walker, James, Shaydulin, Ruslan, Pistoia, Marco, Moses, Steven. A., Hayes, David, Neyenhuis, Brian, Stutz, Russell P., and Foss-Feig, Michael
- Subjects
Quantum Physics - Abstract
Empirical evidence for a gap between the computational powers of classical and quantum computers has been provided by experiments that sample the output distributions of two-dimensional quantum circuits. Many attempts to close this gap have utilized classical simulations based on tensor network techniques, and their limitations shed light on the improvements to quantum hardware required to frustrate classical simulability. In particular, quantum computers having in excess of $\sim 50$ qubits are primarily vulnerable to classical simulation due to restrictions on their gate fidelity and their connectivity, the latter determining how many gates are required (and therefore how much infidelity is suffered) in generating highly-entangled states. Here, we describe recent hardware upgrades to Quantinuum's H2 quantum computer enabling it to operate on up to $56$ qubits with arbitrary connectivity and $99.843(5)\%$ two-qubit gate fidelity. Utilizing the flexible connectivity of H2, we present data from random circuit sampling in highly connected geometries, doing so at unprecedented fidelities and a scale that appears to be beyond the capabilities of state-of-the-art classical algorithms. The considerable difficulty of classically simulating H2 is likely limited only by qubit number, demonstrating the promise and scalability of the QCCD architecture as continued progress is made towards building larger machines., Comment: Includes minor updates to the text and an updated author list to include researchers who made technical contributions in upgrading the machine to 56 qubits but were left off the original version by mistake
- Published
- 2024
22. On the critical points of Steklov eigenfunctions
- Author
-
Battaglia, Luca, Pistoia, Angela, and Provenzano, Luigi
- Published
- 2025
- Full Text
- View/download PDF
23. Convolutional neural networks for automatic MR classification of myocardial iron overload in thalassemia major patients
- Author
-
Positano, Vincenzo, Meloni, Antonella, De Santi, Lisa Anita, Pistoia, Laura, Borsellino, Zelia, Cossu, Alberto, Massei, Francesco, Sanna, Paola Maria Grazia, Santarelli, Maria Filomena, and Cademartiri, Filippo
- Published
- 2024
- Full Text
- View/download PDF
24. Cardiovascular magnetic resonance in β-thalassemia major: beyond T2*
- Author
-
Meloni, Antonella, Saba, Luca, Cademartiri, Filippo, Positano, Vincenzo, Pistoia, Laura, and Cau, Riccardo
- Published
- 2024
- Full Text
- View/download PDF
25. Positive Solutions of Elliptic Systems with Superlinear Terms on the Critical Hyperbola: Positive Solutions of Elliptic Systems
- Author
-
Cuesta, Mabel, Pardo, Rosa, and Pistoia, Angela
- Published
- 2024
- Full Text
- View/download PDF
26. Model-Agnostic Utility-Preserving Biometric Information Anonymization
- Author
-
Chen, Chun-Fu, Moriarty, Bill, Hu, Shaohan, Moran, Sean, Pistoia, Marco, Piuri, Vincenzo, and Samarati, Pierangela
- Subjects
Computer Science - Machine Learning - Abstract
The recent rapid advancements in both sensing and machine learning technologies have given rise to the universal collection and utilization of people's biometrics, such as fingerprints, voices, retina/facial scans, or gait/motion/gestures data, enabling a wide range of applications including authentication, health monitoring, or much more sophisticated analytics. While providing better user experiences and deeper business insights, the use of biometrics has raised serious privacy concerns due to their intrinsic sensitive nature and the accompanying high risk of leaking sensitive information such as identity or medical conditions. In this paper, we propose a novel modality-agnostic data transformation framework that is capable of anonymizing biometric data by suppressing its sensitive attributes and retaining features relevant to downstream machine learning-based analyses that are of research and business values. We carried out a thorough experimental evaluation using publicly available facial, voice, and motion datasets. Results show that our proposed framework can achieve a \highlight{high suppression level for sensitive information}, while at the same time retain underlying data utility such that subsequent analyses on the anonymized biometric data could still be carried out to yield satisfactory accuracy., Comment: Preprint of IJIS version, https://link.springer.com/article/10.1007/s10207-024-00862-8
- Published
- 2024
27. MaSS: Multi-attribute Selective Suppression for Utility-preserving Data Transformation from an Information-theoretic Perspective
- Author
-
Chen, Yizhuo, Chen, Chun-Fu, Hsu, Hsiang, Hu, Shaohan, Pistoia, Marco, and Abdelzaher, Tarek
- Subjects
Computer Science - Machine Learning - Abstract
The growing richness of large-scale datasets has been crucial in driving the rapid advancement and wide adoption of machine learning technologies. The massive collection and usage of data, however, pose an increasing risk for people's private and sensitive information due to either inadvertent mishandling or malicious exploitation. Besides legislative solutions, many technical approaches have been proposed towards data privacy protection. However, they bear various limitations such as leading to degraded data availability and utility, or relying on heuristics and lacking solid theoretical bases. To overcome these limitations, we propose a formal information-theoretic definition for this utility-preserving privacy protection problem, and design a data-driven learnable data transformation framework that is capable of selectively suppressing sensitive attributes from target datasets while preserving the other useful attributes, regardless of whether or not they are known in advance or explicitly annotated for preservation. We provide rigorous theoretical analyses on the operational bounds for our framework, and carry out comprehensive experimental evaluations using datasets of a variety of modalities, including facial images, voice audio clips, and human activity motion sensor signals. Results demonstrate the effectiveness and generalizability of our method under various configurations on a multitude of tasks. Our code is available at https://github.com/jpmorganchase/MaSS., Comment: ICML 2024, GitHub: https://github.com/jpmorganchase/MaSS
- Published
- 2024
28. Variational Quantum Algorithm Landscape Reconstruction by Low-Rank Tensor Completion
- Author
-
Hao, Tianyi, He, Zichang, Shaydulin, Ruslan, Pistoia, Marco, and Tannu, Swamit
- Subjects
Quantum Physics ,Computer Science - Hardware Architecture ,Computer Science - Emerging Technologies - Abstract
Variational quantum algorithms (VQAs) are a broad class of algorithms with many applications in science and industry. Applying a VQA to a problem involves optimizing a parameterized quantum circuit by maximizing or minimizing a cost function. A particular challenge associated with VQAs is understanding the properties of associated cost functions. Having the landscapes of VQA cost functions can greatly assist in developing and testing new variational quantum algorithms, but they are extremely expensive to compute. Reconstructing the landscape of a VQA using existing techniques requires a large number of cost function evaluations, especially when the dimension or the resolution of the landscape is high. To address this challenge, we propose a low-rank tensor-completion-based approach for local landscape reconstruction. By leveraging compact low-rank representations of tensors, our technique can overcome the curse of dimensionality and handle high-resolution landscapes. We demonstrate the power of landscapes in VQA development by showcasing practical applications of analyzing penalty terms for constrained optimization problems and examining the probability landscapes of certain basis states.
- Published
- 2024
29. Prospects of Privacy Advantage in Quantum Machine Learning
- Author
-
Heredge, Jamie, Kumar, Niraj, Herman, Dylan, Chakrabarti, Shouvanik, Yalovetzky, Romina, Sureshbabu, Shree Hari, Li, Changhao, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Machine Learning - Abstract
Ensuring data privacy in machine learning models is critical, particularly in distributed settings where model gradients are typically shared among multiple parties to allow collaborative learning. Motivated by the increasing success of recovering input data from the gradients of classical models, this study addresses a central question: How hard is it to recover the input data from the gradients of quantum machine learning models? Focusing on variational quantum circuits (VQC) as learning models, we uncover the crucial role played by the dynamical Lie algebra (DLA) of the VQC ansatz in determining privacy vulnerabilities. While the DLA has previously been linked to the classical simulatability and trainability of VQC models, this work, for the first time, establishes its connection to the privacy of VQC models. In particular, we show that properties conducive to the trainability of VQCs, such as a polynomial-sized DLA, also facilitate the extraction of detailed snapshots of the input. We term this a weak privacy breach, as the snapshots enable training VQC models for distinct learning tasks without direct access to the original input. Further, we investigate the conditions for a strong privacy breach where the original input data can be recovered from these snapshots by classical or quantum-assisted polynomial time methods. We establish conditions on the encoding map such as classical simulatability, overlap with DLA basis, and its Fourier frequency characteristics that enable such a privacy breach of VQC models. Our findings thus play a crucial role in detailing the prospects of quantum privacy advantage by guiding the requirements for designing quantum machine learning models that balance trainability with robust privacy protection., Comment: 28 pages, 8 figures, 1 table
- Published
- 2024
30. 100 Gbps Quantum-safe IPsec VPN Tunnels over 46 km Deployed Fiber
- Author
-
Alia, Obada, Huang, Albert, Luo, Huan, Amer, Omar, Pistoia, Marco, and Lim, Charles
- Subjects
Quantum Physics - Abstract
We demonstrated for the first time quantum-safe high-speed 100 Gbps site-to-site IPsec tunnels secured using Quantum Key Distribution (QKD) technology. The demonstration was conducted between two JPMorgan Chase Data Centers (DCs) in an air-gapped environment over 46 km of deployed telecom fiber across Singapore achieving 45 days of continuous operation. Two different Virtual Private Network (VPN) tunnel configurations were tested: (1) a QKD-secured VPN tunnel configuration with a maximum throughput of 80 Gbps and (2) a multi-VPN tunnel configuration exhibiting 12 QKD-secured VPN tunnels with a throughput of 8.39 Gbps per tunnel resulting in an aggregated throughput of 99.62 Gbps for all tunnels. For the QKD system performance, we achieved an average Secret Key Rate (SKR) of 7.4 kbps (about 29 AES-256 keys per second), an average Quantum Bit Error Rate (QBER) of 0.8% and an average visibility of 98.6%. We utilized the ETSI-QKD-014 REST-based Application Programming Interface (API) to exchange the QKD generated keys between the key management server in the QKD system and the next-generation firewalls in order to encrypt and decrypt the data. The data was encrypted by the quantum-safe keys using the AES-256-GCM cipher suite with a key refresh rate of 120 seconds without affecting the VPN tunnel connectivity and performance, Comment: 7 pages, 4 figures, 1 table
- Published
- 2024
31. Non-degeneracy of the bubble in a fractional and singular 1D Liouville equation
- Author
-
DelaTorre, Azahara, Mancini, Gabriele, and Pistoia, Angela
- Subjects
Mathematics - Analysis of PDEs ,35R11 (35B33, 45G05) - Abstract
We prove the non-degeneracy of solutions to a fractional and singular Liouville equation defined on the whole real line in presence of a singular term. We use conformal transformations to rewrite the linearized equation as a Steklov eigenvalue problem posed in a bounded domain, which is defined either by an intersection or a union of two disks. We conclude by proving the simplicity of the corresponding eigenvalue.
- Published
- 2024
32. Nonexistence of Courant-type nodal domain bounds for eigenfunctions of the Dirichlet-to-Neumann operator
- Author
-
Enciso, Alberto, Pistoia, Angela, and Provenzano, Luigi
- Subjects
Mathematics - Spectral Theory ,Mathematics - Analysis of PDEs ,Mathematics - Differential Geometry - Abstract
Given a compact manifold $\mathcal M$ with boundary of dimension $n\geq 3$ and any integers $K$ and $N$, we show that there exists a metric on $\mathcal M$ for which the first $K$ nonconstant eigenfunctions of the Dirichlet-to-Neumann map on $\partial\mathcal M$ have at least $N$ nodal components. This provides a negative answer to the question of whether the number of nodal domains of Dirichlet-to-Neumann eigenfunctions satisfies a Courant-type bound, which has been featured in recent surveys by Girouard and Polterovich [21, Open problem 9] and by Colbois, Girouard, Gordon and Sher [9, Open question 10.14].
- Published
- 2024
33. Q-CHOP: Quantum constrained Hamiltonian optimization
- Author
-
Perlin, Michael A., Shaydulin, Ruslan, Hall, Benjamin P., Minssen, Pierre, Li, Changhao, Dubey, Kabir, Rines, Rich, Anschuetz, Eric R., Pistoia, Marco, and Gokhale, Pranav
- Subjects
Quantum Physics ,Computer Science - Emerging Technologies - Abstract
Combinatorial optimization problems that arise in science and industry typically have constraints. Yet the presence of constraints makes them challenging to tackle using both classical and quantum optimization algorithms. We propose a new quantum algorithm for constrained optimization, which we call quantum constrained Hamiltonian optimization (Q-CHOP). Our algorithm leverages the observation that for many problems, while the best solution is difficult to find, the worst feasible (constraint-satisfying) solution is known. The basic idea is to to enforce a Hamiltonian constraint at all times, thereby restricting evolution to the subspace of feasible states, and slowly "rotate" an objective Hamiltonian to trace an adiabatic path from the worst feasible state to the best feasible state. We additionally propose a version of Q-CHOP that can start in any feasible state. Finally, we benchmark Q-CHOP against the commonly-used adiabatic algorithm with constraints enforced using a penalty term and find that Q-CHOP performs consistently better on a wide range of problems, including textbook problems on graphs, knapsack, combinatorial auction, as well as a real-world financial use case, namely bond exchange-traded fund basket optimization.
- Published
- 2024
34. Quantum counterdiabatic driving with local control
- Author
-
Li, Changhao, Shen, Jiayu, Shaydulin, Ruslan, and Pistoia, Marco
- Subjects
Quantum Physics ,Condensed Matter - Statistical Mechanics ,Physics - Applied Physics ,Physics - Atomic Physics - Abstract
Suppression of diabatic transitions in quantum adiabatic evolution stands as a significant challenge for ground state preparations. Counterdiabatic driving has been proposed to compensate for diabatic losses and achieve shortcut to adiabaticity. However, its implementation necessitates the generation of adiabatic gauge potential, which requires knowledge of the spectral gap of instantaneous Hamiltonians and involves highly non-local drivings in many-body systems. In this work, we consider local counterdiabatic (LCD) driving with approximate adiabatic gauge potential. Using transverse-field Ising model as an example, we present an in-depth study of the performance and optimization of LCD protocols. We then propose a novel two-step protocol based on LCD and simple local single-body control to further improve the performance. The optimization of these LCD-based protocols does not require knowledge of instantaneous Hamiltonians, and only additional local driving is involved. To benchmark the performance of LCD and the proposed local control-enhanced LCD technique, we experimentally implement digitized adiabatic quantum evolution in a trapped-ion system. We characterize the quality of the prepared states and explore the scaling behavior with system size up to 14 qubits. Our demonstration of quantum shortcut to adiabaticity opens a path towards preparing ground states of complex systems with accessible local controls., Comment: 28 pages, 13 figures
- Published
- 2024
35. Partially concentrating standing waves for weakly coupled Schrödinger systems
- Author
-
Pellacci, Benedetta, Pistoia, Angela, Vaira, Giusi, and Verzini, Gianmaria
- Published
- 2024
- Full Text
- View/download PDF
36. Left atrial strain in patients with β-thalassemia major: a cross-sectional CMR study
- Author
-
Meloni, Antonella, Saba, Luca, Positano, Vincenzo, Pistoia, Laura, Porcu, Michele, Massei, Francesco, Sanna, Paola Maria Grazia, Longo, Filomena, Giovangrossi, Piera, Argento, Crocetta, Gerardi, Calogera, Cademartiri, Filippo, and Cau, Riccardo
- Published
- 2024
- Full Text
- View/download PDF
37. Quantum option pricing via the Karhunen-Lo\`{e}ve expansion
- Author
-
Prakash, Anupam, Sun, Yue, Chakrabarti, Shouvanik, Che, Charlie, Dandapani, Aditi, Herman, Dylan, Kumar, Niraj, Sureshbabu, Shree Hari, Wood, Ben, Kerenidis, Iordanis, and Pistoia, Marco
- Subjects
Quantum Physics - Abstract
We consider the problem of pricing discretely monitored Asian options over $T$ monitoring points where the underlying asset is modeled by a geometric Brownian motion. We provide two quantum algorithms with complexity poly-logarithmic in $T$ and polynomial in $1/\epsilon$, where $\epsilon$ is the additive approximation error. Our algorithms are obtained respectively by using an $O(\log T)$-qubit semi-digital quantum encoding of the Brownian motion that allows for exponentiation of the stochastic process and by analyzing classical Monte Carlo algorithms inspired by the semi-digital encodings. The best quantum algorithm obtained using this approach has complexity $\widetilde{O}(1/\epsilon^{3})$ where the $\widetilde{O}$ suppresses factors poly-logarithmic in $T$ and $1/\epsilon$. The methods proposed in this work generalize to pricing options where the underlying asset price is modeled by a smooth function of a sub-Gaussian process and the payoff is dependent on the weighted time-average of the underlying asset price.
- Published
- 2024
38. A note on the persistence of multiplicity of eigenvalues of fractional Laplacian under perturbations
- Author
-
Ghimenti, Marco, Micheletti, Anna Maria, and Pistoia, Angela
- Subjects
Mathematics - Analysis of PDEs - Abstract
We consider the eigenvalues problem for the the fractional Laplacian in a bounded domain Omega with Dirichlet boundary condition. A recent result by Fall, Ghimenti, Micheletti and Pistoia (CVPDE (2023)) states that under generic small perturbations of the coefficient of the equation or of the domain Omega all the eigenvalues are simple. In this paper we give a condition for which a perturbation of the coefficient or of the domain preserves the multiplicity of a given eigenvalue. Also, in the case of an eigenvalue of multiplicity 2 we prove that the set of perturbations of the coefficients which preserve the multiplicity is a smooth manifold of codimension $2$ in C^1(Omega).
- Published
- 2024
39. On the critical points of Steklov eigenfunctions
- Author
-
Battaglia, Luca, Pistoia, Angela, and Provenzano, Luigi
- Subjects
Mathematics - Analysis of PDEs ,Mathematics - Differential Geometry ,Mathematics - Spectral Theory - Abstract
We consider the critical points of Steklov eigenfunctions on a compact, smooth $n$-dimensional Riemannian manifold $M$ with boundary $\partial M$. For generic metrics on $M$ we establish an identity which relates the sum of the indexes of a Steklov eigenfunction, the sum of the indexes of its restriction to $\partial M$, and the Euler characteristic of $M$. In dimension $2$ this identity gives a precise count of the interior critical points of a Steklov eigenfunction in terms of the Euler characteristic of $M$ and of the number of sign changes of $u$ on $\partial M$. In the case of the second Steklov eigenfunction on a genus $0$ surface, the identity holds for any metric. As a by-product of the main result, we show that for generic metrics on $M$ Steklov eigenfunctions are Morse functions in $M$.
- Published
- 2024
40. New sign-changing solutions for the 2D Lane-Emden problem with large exponents
- Author
-
Pistoia, Angela and Ricciardi, Tonia
- Subjects
Mathematics - Analysis of PDEs - Abstract
We construct a new family of sign-changing solutions for a two-dimensional Lane-Emden problem with large exponent whose shape resembles a tower with alternating sign of bubbles solving different singular Liouville equations on the whole plane.
- Published
- 2023
41. Privacy-preserving quantum federated learning via gradient hiding
- Author
-
Li, Changhao, Kumar, Niraj, Song, Zhixin, Chakrabarti, Shouvanik, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Machine Learning - Abstract
Distributed quantum computing, particularly distributed quantum machine learning, has gained substantial prominence for its capacity to harness the collective power of distributed quantum resources, transcending the limitations of individual quantum nodes. Meanwhile, the critical concern of privacy within distributed computing protocols remains a significant challenge, particularly in standard classical federated learning (FL) scenarios where data of participating clients is susceptible to leakage via gradient inversion attacks by the server. This paper presents innovative quantum protocols with quantum communication designed to address the FL problem, strengthen privacy measures, and optimize communication efficiency. In contrast to previous works that leverage expressive variational quantum circuits or differential privacy techniques, we consider gradient information concealment using quantum states and propose two distinct FL protocols, one based on private inner-product estimation and the other on incremental learning. These protocols offer substantial advancements in privacy preservation with low communication resources, forging a path toward efficient quantum communication-assisted FL protocols and contributing to the development of secure distributed quantum machine learning, thus addressing critical privacy concerns in the quantum computing era., Comment: 12 pages, 2 figures, 1 table
- Published
- 2023
- Full Text
- View/download PDF
42. Three-year treatment with anti-CGRP monoclonal antibodies modifies migraine course: the prospective, multicenter I-GRAINE study
- Author
-
Barbanti, Piero, Aurilia, Cinzia, Torelli, Paola, Egeo, Gabriella, d’Onofrio, Florindo, Finocchi, Cinzia, Carnevale, Antonio, Viticchi, Giovanna, Russo, Marco, Quintana, Simone, Orlando, Bianca, Fiorentini, Giulia, Messina, Roberta, Bartolini, Marco, Pistoia, Francesca, Filippi, Massimo, Bonassi, Stefano, Cevoli, Sabina, and Mannocci, Alice
- Published
- 2025
- Full Text
- View/download PDF
43. Synergizing quantum techniques with machine learning for advancing drug discovery challenge
- Author
-
Liang, Zhiding, He, Zichang, Sun, Yue, Herman, Dylan, Jiao, Qingyue, Zhu, Yanzhang, Jiang, Weiwen, Xu, Xiaowei, Wu, Di, Pistoia, Marco, and Shi, Yiyu
- Published
- 2024
- Full Text
- View/download PDF
44. Solving linear systems on quantum hardware with hybrid HHL++
- Author
-
Yalovetzky, Romina, Minssen, Pierre, Herman, Dylan, and Pistoia, Marco
- Published
- 2024
- Full Text
- View/download PDF
45. Characterizing barren plateaus in quantum ansätze with the adjoint representation
- Author
-
Fontana, Enrico, Herman, Dylan, Chakrabarti, Shouvanik, Kumar, Niraj, Yalovetzky, Romina, Heredge, Jamie, Sureshbabu, Shree Hari, and Pistoia, Marco
- Published
- 2024
- Full Text
- View/download PDF
46. Effectiveness and tolerability of rimegepant in the acute treatment of migraine: a real-world, prospective, multicentric study (GAINER study)
- Author
-
Luigi Francesco Iannone, Gloria Vaghi, Gabriele Sebastianelli, Francesco Casillo, Antonio Russo, Marcello Silvestro, Francesca Pistoia, Giorgio Dalla Volta, Matteo Cortinovis, Alberto Chiarugi, Danilo Antonio Montisano, Maria Pia Prudenzano, Sabina Cevoli, Edoardo Mampreso, Gianluca Avino, Marina Romozzi, Mariarosaria Valente, Carla Fasano, Stefania Battistini, Antonio Granato, Elisa Maria Piella, Innocenzo Rainero, Raffaele Ornello, Roberto De Icco, and On behalf of the Italian Headache Registry (RICe) Study Group
- Subjects
Acute treatments ,Gepants ,Triptans ,CGRP ,Medicine - Abstract
Abstract Background Rimegepant, a novel oral calcitonin gene-related peptide receptor antagonist, has been recently approved for the acute migraine treatment. While its efficacy was confirmed in randomized clinical trials, no data is available regarding real-life effectiveness and tolerability. GAINER, a prospective, multicentric study, aimed to evaluate rimegepant effectiveness and tolerability in the real-world setting. Methods Our study involved 16 headache centers across Italy. The main outcomes were: i) 2 h pain freedom, and ii) occurrence of treatment-emergent adverse events after administration. Participants were instructed to treat one migraine attack with rimegepant 75 mg orally disintegrating tablet. Using an ad hoc diary, participants prospectively collected migraine attack features at baseline and every 30 min after rimegepant administration, up to 2 h post dose. A 24 h follow up was also collected. Results We enrolled 103 participants with migraine (74.8% female, mean age 44.4 [42.0 – 46.7] years, 24.3% with chronic migraine of whom 44.0% presented a concomitant diagnosis of medication overuse headache). The number of previously failed preventive classes was 2.7 [2.3 – 3.2]. Participants presented a mean of 9.6 [8.2 – 10.9] monthly migraine days at baseline. At rimegepant intake, 40.8% of patients rated migraine intensity as severe. Pain freedom 2 h post dose was reported in 44.7% (46/103) of individuals. Pain freedom 2 h post dose was not influenced by baseline pain severity (p = 0.316), but it was associated with timing of intake (p = 0.032) with a higher rate of 2 h pain freedom when rimegepant was taken within 1 h from pain onset. Mild adverse events were reported in 15.5% total attacks (16/103), predominantly fatigue (n = 6), gastrointestinal symptoms (n = 6), somnolence (n = 4), and transient cognitive difficulties (n = 3). Tolerability was rated as good-to-excellent in 85.4% cases (88/103). Conclusions Our data confirms rimegepant effectiveness and safety in the acute migraine treatment in a real-world setting in a cohort of participants that includes subjects with episodic or chronic migraine, medication overuse and a high number of prior preventive treatment failures. Trial registration The study was preregistered on clinicaltrial.gov, NCT05903027.
- Published
- 2025
- Full Text
- View/download PDF
47. Generic Properties of Critical Points of the Weyl Tensor
- Author
-
Micheletti Anna Maria and Pistoia Angela
- Subjects
weyl tensor ,nondegenerate critical points ,yamabe problem ,58j60 ,53c21 ,Mathematics ,QA1-939 - Abstract
Given (M,g)${(M,g)}$, a smooth compact Riemannian n-manifold, we prove that for a generic Riemannian metric g the critical points of the function 𝒲g(ξ):=|Weylg(ξ)|g2${\mathcal{W}_{g}(\xi):=\lvert\mathrm{Weyl}_{g}(\xi)\rvert^{2}_{g}}$ with 𝒲g(ξ)≠0${\mathcal{W}_{g}(\xi)\not=0}$ are nondegenerate.
- Published
- 2017
- Full Text
- View/download PDF
48. Partially concentrating standing waves for weakly coupled Schr\'odinger systems
- Author
-
Pellacci, Benedetta, Pistoia, Angela, Vaira, Giusi, and Verzini, Gianmaria
- Subjects
Mathematics - Analysis of PDEs - Abstract
We study the existence of standing waves for the following weakly coupled system of two Schr\"odinger equations in $\mathbb{R}^N$, $N=2,3$, \[ \begin{cases} i \hslash \partial_{t}\psi_{1}=-\frac{\hslash^2}{2m_{1}}\Delta \psi_{1}+ {V_1}(x)\psi_{1}-\mu_{1}|\psi_{1}|^{2}\psi_{1}-\beta|\psi_{2}|^{2}\psi_{1} & \\ i \hslash \partial_{t}\psi_{2}=-\frac{\hslash^2}{2m_{2}}\Delta \psi_{2}+ {V_2}(x)\psi_{2}-\mu_{2}|\psi_{2}|^{2}\psi_{2}-\beta|\psi_{1}|^{2}\psi_{2},& \end{cases} \] where $V_1$ and $V_2$ are radial potentials bounded from below. We address the case $m_{1}\sim \hslash^2\to0$, $m_2$ constant, and prove the existence of a standing wave solution with both nontrivial components satisfying a prescribed asymptotic profile. In particular, the second component of such solution exhibits a concentrating behavior, while the first one keeps a quantum nature., Comment: 23 pages
- Published
- 2023
49. Positive solutions of elliptic systems with superlinear terms on the critical hyperbola
- Author
-
Cuesta, Mabel, Pardo, Rosa, and Pistoia, Angela
- Subjects
Mathematics - Analysis of PDEs - Abstract
We consider a slightly subcritical elliptic system with Dirichlet boundary conditions and a non-power nonlinearity in a bounded smooth domain. For this problem, standard compact embeddings cannot be used to guarantee the existence of solutions as in the case of power-type nonlinearities. Instead, we use the dual method on Orlicz spaces, showing that our problem possesses a mountain pass type solution.
- Published
- 2023
50. Blind quantum machine learning with quantum bipartite correlator
- Author
-
Li, Changhao, Li, Boning, Amer, Omar, Shaydulin, Ruslan, Chakrabarti, Shouvanik, Wang, Guoqing, Xu, Haowei, Tang, Hao, Schoch, Isidor, Kumar, Niraj, Lim, Charles, Li, Ju, Cappellaro, Paola, and Pistoia, Marco
- Subjects
Quantum Physics ,Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
Distributed quantum computing is a promising computational paradigm for performing computations that are beyond the reach of individual quantum devices. Privacy in distributed quantum computing is critical for maintaining confidentiality and protecting the data in the presence of untrusted computing nodes. In this work, we introduce novel blind quantum machine learning protocols based on the quantum bipartite correlator algorithm. Our protocols have reduced communication overhead while preserving the privacy of data from untrusted parties. We introduce robust algorithm-specific privacy-preserving mechanisms with low computational overhead that do not require complex cryptographic techniques. We then validate the effectiveness of the proposed protocols through complexity and privacy analysis. Our findings pave the way for advancements in distributed quantum computing, opening up new possibilities for privacy-aware machine learning applications in the era of quantum technologies., Comment: 11 pages, 3 figures
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.