نتایج جستجو برای: کد alice

تعداد نتایج: 12588  

2009
Masahiro Hotta

In this paper, a protocol is proposed in which energy extraction from local vacuum states is possible by using quantum measurement information for the vacuum state of quantum fields. In the protocol, Alice, who stays at a spatial point, excites the ground state of the fields by a local measurement. Consequently, wavepackects generated by A' measurement propagate the vacuum to spatial infinity. ...

2006
Shai Avidan Moshe Butman

Alice would like to detect faces in a collection of sensitive surveillance images she own. Bob has a face detection algorithm that he is willing to let Alice use, for a fee, as long as she learns nothing about his detector. Alice is willing to use Bob’s detector provided that he will learn nothing about her images, not even the result of the face detection operation. Blind vision is about apply...

2004
Ting Gao Feng-Li Yan Zhi-Xi Wang

We present a quantum secure direct communication scheme achieved by swapping quantum entanglement. In this scheme a set of ordered Einstein-Podolsky-Rosen (EPR) pairs is used as a quantum information channel for sending secret messages directly. After insuring the safety of the quantum channel, the sender Alice encodes the secret messages directly by applying a series local operations on her pa...

2017
Iouri Belikov

The ALICE experiment at CERN is now ready to take data in protonproton and ultra-relativistic heavy-ion collisions at LHC. This review starts with a description of the ALICE experimental setup and its excellent tracking and particle identification capabilities. Then, we will discuss the ways to probe the hot and dense medium created at multi-TeV energies by measuring the yields and kinematic ch...

Journal: :Physical review letters 1992
Bennett Wiesner

As is well known, operations on one particle of an Einstein-Podolsky-Rosen (EPR) pair cannot influence the marginal statistics of measurements on the other particle. We characterize the set of states accessible from an initial EPR state by one-particle operations and show that in a sense they allow two bits to be encoded reliably in one spin2 particle: One party, "Alice, " prepares an EPR pair ...

1993
Charles H. Bennett Gilles Brassard Richard Jozsa Asher Peres William K. Wootters

An unknown quantum state ji can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical EPR correlations. To do so the sender, \Alice," and the receiver, \Bob," must prearrange the sharing of an EPR-correlated pair of particles. Alice makes a joint measurement on her EPR particle and the unknown quantum system, and sends Bob the classical result...

2008
R. Schicker

The ALICE experiment at the Large Hadron Collider LHC is presently being commissioned. ALICE consists of a central barrel, a muon spectrometer and neutron calorimeters at 00. Additional detectors for event classification and trigger purposes are located on both sides of the central barrel. The geometry of the ALICE detector allows the implementation of a diffractive double gap trigger by requir...

Maryam Forat Yazdi, Mohammad Hasan Gerami Mohammad Hossein Baghianimoghadam

Introduction This research was done with the objective of "Determine the effectiveness of learning coping strategies with Irrational Beliefs based on the theory of rational-emotional Alice on students’ attitude toward premarital relations in Yazd city". Materials and Methods In this semi experimental research 60 female students of Yazd-Iran, selected by using of Cochran’s formula and divided in...

2002
C.-L. Chou L. Y. Hsu

Three different quantum cards which are non-orthogonal quantum bits are sent to two different players, Alice and Bob, randomly. Alice receives one of the three cards, and Bob receives the remaining two cards. We find that Bob could know better than Alice does on guessing Alice’s card, no matter what Bob chooses to measure his two cards collectively or separately. We also find that Bob’s best st...

2002
Ameya Virkar

Encryption Key Search is a compute-intensive operation that consists of a brute-force search of a particular key in a given key space. Sequential execution time for a 56-bit encryption key search is approximately 200,000 years and therefore it is ideal to execute such operation in a grid environment. ALiCE (Adaptive and scaLable internet-based Computing Engine) is a grid middleware that offers ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید