CS 191 – Fall 2014
نویسنده
چکیده
Errors and noise in quantum computing arise from the coupling of our computing system (e.g., a collection of qubits) to an " environment " that we cannot fully control or observe. This coupling leads to open quantum system dynamics and in the last couple of lectures you've seen three different ways in which we model such dynamics: 1. Specify the Hamiltonian for the entire setup including system, environment and the way in which they are coupled:
منابع مشابه
CS 191 , Fall 2014 Lecture 3 : Writing in the Large ( Continued ) September 19 , 2014 Scribe :
In the last lecture, we saw how we should write the title for a paper. We also critiqued some titles of published papers. In this lecture, we will continue the topic of writing in the large. We will discuss writing the date, the abstract, and the introduction. We will also critique an abstract of a paper written by Tom and his former student Geeta. Zobel, in [1], recommends a writer to ask hims...
متن کاملCS 191 – Fall 2014 Lecture 10 : Generalized measurement , partial trace , and distance in state space
where the Pi are projectors (PiPj = Piδij) and the λi are unique, meaning that the Pi are not necessarily rank 1. If the Pi is not rank 1, then it can be expressed as a sum of rank 1 projectors: i.e., if the rank of Pi is k, Pi = ∣∣φi1〉 〈φi1∣∣+ ∣∣φi2〉 〈φi2∣∣ ...+ ∣∣φik〉 〈φik∣∣. Measuring an observable O on a state |ψ〉 yields a result that we label with the λi, and we think of the measurement as...
متن کاملCS 191 – Fall 2014 Lecture 18 : Fault - tolerance and the threshold theorem
Now that we have looked at a few error correction codes and their implementation, we are ready to examine the notion of fault tolerance. The basic idea of fault tolerance is that if we perform error correction “well”, then it is possible to execute an arbitrarily long quantum computation with “reasonable” resources. This may seem intuitive but it is a nontrivial statement because (i) we need to...
متن کاملCS 191 – Fall 2014 Lectures 12 & 13 : Introduction to quantum key distribution
We begin with a brief review of classical cryptography, especially the parts that are most relevant for QKD. Firstly, it is imperative to introduce the key players in most cryptographic scenarios: Alice and Bob are the parties that want to securely communicate and Eve is the malicious eavesdropper. Communication is achieved by the encoding of a secret message into what is called cypher text by ...
متن کامل