首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10篇
  免费   0篇
工业技术   10篇
  2016年   1篇
  2013年   3篇
  2009年   1篇
  2006年   1篇
  2004年   1篇
  2003年   1篇
  2002年   2篇
排序方式: 共有10条查询结果,搜索用时 15 毫秒
1
1.
2.
Quantum Malware     
When quantum communication networks proliferate they will likely be subject to a new type of attack by hackers, virus makers, and other malicious intruders. Here we introduce the concept of “quantum malware” to describe such human-made intrusions. We offer a simple solution for storage of quantum information in a manner, which protects quantum networks from quantum malware. This solution involves swapping the quantum information at random times between the network and isolated, distributed ancillas. It applies to arbitrary attack types, provided the protective operations are themselves not compromised.  相似文献   
3.
Abstract

Quantum error prevention strategies will be required to produce a scalable quantum computing device and are of central importance in this regard. Progress in this area has been quite rapid in the past few years. In order to provide an overview of the achievements in this area, we discuss the three major classes of error prevention strategies, the abilities of these methods and the shortcomings. We then discuss the combinations of these strategies which have recently been proposed in the literature. Finally, we present recent results in reducing errors on encoded subspaces using decoupling controls. We show how to generally remove mixing of an encoded subspace with external states (termed leakage errors) using decoupling controls. Such controls are known as ‘leakage elimination operations’ or ‘LEOs’.  相似文献   
4.
5.
Abstract

Proposals for quantum computing devices are many and varied. They each have unique noise processes that make none of them fully reliable at this time. There are several error correction/avoidance techniques which are valuable for reducing or eliminating errors, but not one, alone, will serve as a panacea. One must therefore take advantage of the strength of each of these techniques so that we may extend the coherence times of the quantum systems and create more reliable computing devices. To this end we give a general strategy for using dynamical decoupling operations on encoded subspaces. These encodings may be of any form; of particular importance are decoherence-free subspaces and quantum error correction codes. We then give means for empirically determining an appropriate set of dynamical decoupling operations for a given experiment. Using these techniques, we then propose a comprehensive encoding solution to many of the problems of quantum computing proposals which use exchange-type interactions. This uses a decoherence-free subspace and an efficient set of dynamical decoupling operations. It also addresses the problem of controllability in solid-state quantum dot devices.  相似文献   
6.
We show that the problem of designing a quantum information processing error correcting procedure can be cast as a bi-convex optimization problem, iterating between encoding and recovery, each being a semidefinite program. For a given encoding operator the problem is convex in the recovery operator. For a given method of recovery, the problem is convex in the encoding scheme. This allows us to derive new codes that are locally optimal. We present examples of such codes that can handle errors which are too strong for codes derived by analogy to classical error correction techniques.  相似文献   
7.
We develop an approach to machine learning and anomaly detection via quantum adiabatic evolution. This approach consists of two quantum phases, with some amount of classical preprocessing to set up the quantum problems. In the training phase we identify an optimal set of weak classifiers, to form a single strong classifier. In the testing phase we adiabatically evolve one or more strong classifiers on a superposition of inputs in order to find certain anomalous elements in the classification space. Both the training and testing phases are executed via quantum adiabatic evolution. All quantum processing is strictly limited to two-qubit interactions so as to ensure physical feasibility. We apply and illustrate this approach in detail to the problem of software verification and validation, with a specific example of the learning phase applied to a problem of interest in flight control systems. Beyond this example, the algorithm can be used to attack a broad class of anomaly detection problems.  相似文献   
8.
We review the quantum adiabatic approximation for closed systems, and its recently introduced generalization to open systems (M.S. Sarandy and D.A. Lidar, eprint quant-ph/0404147). We also critically examine a recent argument claiming that there is an inconsistency in the adiabatic theorem for closed quantum systems (K.P. Marzlin and B.C. Sanders, Phys. Rev. Lett. 93, 160408 (2004).) and point out how an incorrect manipulation of the adiabatic theorem may lead one to obtain such an inconsistent result.PACS: 03.65.Ta, 03.65.Yz, 03.67.-a, 03.65.Vf.  相似文献   
9.
10.
We introduce simple qubit-encodings and logic gates which eliminate the need for certain difficult single-qubit operations in superconducting phase-qubits, while preserving universality. The simplest encoding uses two physical qubits per logical qubit. Two architectures for its implementation are proposed: one employing N physical qubits out of which N/2 are ancillas fixed in the |1 state, the other employing N/2+1 physical qubits, one of which is a bus qubit connected to all others. Details of a minimal set of universal encoded logic operations are given, together with recoupling schemes, that require nanosecond pulses. A generalization to codes with higher ratio of number of logical qubits per physical qubits is presented. Compatible decoherence and noise suppression strategies are also discussed. PACS: 03.67.Lx; 85.25.Hv; 03.67.-a; 89.70.+c  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号