Deterministic event-based simulation of quantum phenomena
نویسندگان
چکیده
منابع مشابه
Deterministic event-based simulation of quantum phenomena
We propose and analyse simple deterministic algorithms that can be used to construct machines that have primitive learning capabilities. We demonstrate that locally connected networks of these machines can be used to perform blind classification on an event-by-event basis, without storing the information of the individual events. We also demonstrate that properly designed networks of these mach...
متن کاملEvent-by-Event Simulation of Quantum Phenomena
Recent advances in nanotechnology are paving the way to attain control over individual microscopic objects. The ability to prepare, manipulate, couple and measure single microscopic systems facilitate the study of single quantum systems at the level of individual events. Such experiments address the most fundamental aspects of quantum theory. Indeed, quantum theory gives us only a recipe to com...
متن کاملDeterministic event-based simulation of universal quantum computation
The basic ideas of quantum computation were formulated more than twenty years ago [1,2]. Ten years ago DiVincenzo has proven that the CNOT gate and single-qubit operations constitute a set of gates that can be used to construct a universal quantum computer [3]. This statement is equivalent to the one that a digital classical computer can be constructed by means of NAND gates only. Conventional ...
متن کاملDeterministic error model for quantum computer simulation
Quantum computers QCs must implement quantum error correcting codes QECCs to protect their logical qubits from errors, and modeling the effectiveness of QECCs on QCs is an important problem for evaluating the QC architecture. The previously developed Monte Carlo MC error models may take days or weeks of execution to produce an accurate result due to their random sampling approach. We present an...
متن کاملEvent-by-event Simulation of Quantum Cryptography Protocols∗
Cryptography is an artifice of exchanging information between two parties such that an unauthorized person cannot retrieve this information. To this end, the sender usually employs some key to encrypt the information to be transmitted, and the receiver applies a decryption algorithm to recover the original information. If the cryptographic system is secure, an eavesdropper can decipher the encr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Physics Communications
سال: 2005
ISSN: 0010-4655
DOI: 10.1016/j.cpc.2005.04.012