A Practical Architecture for Reliable Quantum Computers
نویسندگان
چکیده
Q uantum computers offer the prospect of computation that scales exponentially with data size. Unfortunately, a single bit error can corrupt an exponential amount of data. Quantum mechanics can seem more suited to science fiction than system engineering, yet small quantum devices of 5 to 7 bits have nevertheless been built in the laboratory, 100-bit devices are on the drawing table now, and emerging quantum technologies promise even greater scalability. More importantly, improvements in quantum error-correction codes have established a threshold theorem, according to which scalable quantum computers can be built from faulty components as long as the error probability for each quantum operation is less than some constant (estimated to be as high as 10). The overhead for quantum error correction remains daunting: Current well-known codes require tens of thousands of elementary operations to provide a single fault-tolerant logical operation. But proof of the threshold theorem fundamentally alters the prospects for quantum computers. No principle of physics prevents their realization—it is an engineering problem. Empirical studies of practical quantum architectures are just beginning to appear in the literature. Elementary architectural concepts are still lacking: How do we provide quantum storage, data paths, classical control circuits, parallelism, and system integration? And, crucially, how can we design architectures to reduce error-correction overhead?
منابع مشابه
A Study of Various Quantum Cryptographic Architectures and an Efficient Implementation in Present Scenario and Results BB84 Protocol -A Practical Overview
Quantum Cryptography is also a Promising Approach visible of final Quantum Computers existence. it is a singular study Technique that provides us a singular secret Protocol that cannot be glorious by anybody. Quantum Cryptography holds foot on laws of Physics The quantum physics Law, however not as like that we have a tendency to area unit victimization addition, multiplication kind of arithmet...
متن کاملA Quantum Computer Architecture using Nonlocal Interactions
Several authors have described the basic requirements essential to build a scalable quantum computer. Because many physical implementation schemes for quantum computing rely on nearest neighbor interactions, there is a hidden quantum communication overhead to connect distant nodes of the computer. In this paper we propose a physical solution to this problem which, together with the key building...
متن کاملMicrocoded Architectures for Ion-Trap Quantum Computers
In this paper we present the first ever systematic design space exploration of microcoded software fault tolerant iontrap quantum computers. This exploration reveals the critical importance of a well-tuned microcode for providing high performance and ensuring system reliability. In addition, we find that, despite recent advances in the reliability of quantum memory, the impact of errors due to ...
متن کاملMemcomputing: computing with and in memory
The need for a new computing paradigm Present electronic systems used for computing (PCs, workstations and clusters) are based on the von Neumann architecture (see Figure 1, left panel) [1]. This computing paradigm employs the Turing machine concept [2], [3], and involves a significant amount of information transfer between a central processing unit (CPU) and memory, with concomitant limitation...
متن کاملAbstract for an Invited Paper for the MAR07 Meeting of The American Physical Society Architectural Design Issues for Reliable Trapped Ion Quantum Computers
for an Invited Paper for the MAR07 Meeting of The American Physical Society Architectural Design Issues for Reliable Trapped Ion Quantum Computers ISAAC CHUANG, MIT Central to the design of large-scale quantum computers is the fact that reliable quantum systems must explicitly and actively deal with relatively large component failure rates during operation. A quantum computing system must thus ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Computer
دوره 35 شماره
صفحات -
تاریخ انتشار 2002