نتایج جستجو برای: alice code

تعداد نتایج: 173826  

Journal: :Physical review letters 1992
Bennett Wiesner

As is well known, operations on one particle of an Einstein-Podolsky-Rosen (EPR) pair cannot influence the marginal statistics of measurements on the other particle. We characterize the set of states accessible from an initial EPR state by one-particle operations and show that in a sense they allow two bits to be encoded reliably in one spin2 particle: One party, "Alice, " prepares an EPR pair ...

1993
Charles H. Bennett Gilles Brassard Richard Jozsa Asher Peres William K. Wootters

An unknown quantum state ji can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical EPR correlations. To do so the sender, \Alice," and the receiver, \Bob," must prearrange the sharing of an EPR-correlated pair of particles. Alice makes a joint measurement on her EPR particle and the unknown quantum system, and sends Bob the classical result...

2008
R. Schicker

The ALICE experiment at the Large Hadron Collider LHC is presently being commissioned. ALICE consists of a central barrel, a muon spectrometer and neutron calorimeters at 00. Additional detectors for event classification and trigger purposes are located on both sides of the central barrel. The geometry of the ALICE detector allows the implementation of a diffractive double gap trigger by requir...

Maryam Forat Yazdi, Mohammad Hasan Gerami Mohammad Hossein Baghianimoghadam

Introduction This research was done with the objective of "Determine the effectiveness of learning coping strategies with Irrational Beliefs based on the theory of rational-emotional Alice on students’ attitude toward premarital relations in Yazd city". Materials and Methods In this semi experimental research 60 female students of Yazd-Iran, selected by using of Cochran’s formula and divided in...

2002
C.-L. Chou L. Y. Hsu

Three different quantum cards which are non-orthogonal quantum bits are sent to two different players, Alice and Bob, randomly. Alice receives one of the three cards, and Bob receives the remaining two cards. We find that Bob could know better than Alice does on guessing Alice’s card, no matter what Bob chooses to measure his two cards collectively or separately. We also find that Bob’s best st...

2002
Ameya Virkar

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 years and therefore it is ideal to execute such operation in a grid environment. ALiCE (Adaptive and scaLable internet-based Computing Engine) is a grid middleware that offers ...

2004
Zachary D. Walton Alexander V. Sergienko Lev B. Levitin Bahaa E. A. Saleh Malvin C. Teich

We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and timebin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We...

Journal: :CoRR 2002
Arindam Mitra

It is sometimes necessary to send copies of the same email to different parties, but it is impossible to ensure that if one party reads the message the other parties will bound to read it. We propose an entanglement based scheme where if one party reads the message the other party will bound to read it simultaneously. It would be interesting thing if one transmits same or different messages to ...

2010
C. Bombonati S. Masciocchi K. Schweda J. Stachel H. Yang

Beauty is produced much more abundantly at LHC energies compared to RHIC energies. The increase in production, coupled with the beauty large mass, makes it an interesting observable for the physic of the ALICE experiment[1]. Semi-electronic decay of beauty mesons offers a powerful tool to study beauty production in ALICE, attributed to its high tracking resolution (ITS, TPC, TRD) and vertexing ...

2018
Dimiter Ostrev

We consider a setup in which the channel from Alice to Bob is less noisy than the channel from Eve to Bob. We show that there exist encoding and decoding which accomplish error correction and authentication simultaneously; that is, Bob is able to correctly decode a message coming from Alice and reject a message coming from Eve with high probability. The system does not require any secret key sh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید