CS 191 – Fall 2014

نویسنده

  • Mohan Sarovar
چکیده

Errors and noise in quantum computing arise from the coupling of our computing system (e.g., a collection of qubits) to an " environment " that we cannot fully control or observe. This coupling leads to open quantum system dynamics and in the last couple of lectures you've seen three different ways in which we model such dynamics: 1. Specify the Hamiltonian for the entire setup including system, environment and the way in which they are coupled:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CS 191 , Fall 2014 Lecture 3 : Writing in the Large ( Continued ) September 19 , 2014 Scribe :

In the last lecture, we saw how we should write the title for a paper. We also critiqued some titles of published papers. In this lecture, we will continue the topic of writing in the large. We will discuss writing the date, the abstract, and the introduction. We will also critique an abstract of a paper written by Tom and his former student Geeta. Zobel, in [1], recommends a writer to ask hims...

متن کامل

CS 191 – Fall 2014 Lecture 10 : Generalized measurement , partial trace , and distance in state space

where the Pi are projectors (PiPj = Piδij) and the λi are unique, meaning that the Pi are not necessarily rank 1. If the Pi is not rank 1, then it can be expressed as a sum of rank 1 projectors: i.e., if the rank of Pi is k, Pi = ∣∣φi1〉 〈φi1∣∣+ ∣∣φi2〉 〈φi2∣∣ ...+ ∣∣φik〉 〈φik∣∣. Measuring an observable O on a state |ψ〉 yields a result that we label with the λi, and we think of the measurement as...

متن کامل

CS 191 – Fall 2014 Lecture 18 : Fault - tolerance and the threshold theorem

Now that we have looked at a few error correction codes and their implementation, we are ready to examine the notion of fault tolerance. The basic idea of fault tolerance is that if we perform error correction “well”, then it is possible to execute an arbitrarily long quantum computation with “reasonable” resources. This may seem intuitive but it is a nontrivial statement because (i) we need to...

متن کامل

CS 191 – Fall 2014 Lectures 12 & 13 : Introduction to quantum key distribution

We begin with a brief review of classical cryptography, especially the parts that are most relevant for QKD. Firstly, it is imperative to introduce the key players in most cryptographic scenarios: Alice and Bob are the parties that want to securely communicate and Eve is the malicious eavesdropper. Communication is achieved by the encoding of a secret message into what is called cypher text by ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014