Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Explorations in Quantum Computing (Texts in Computer Science)

Buy

In the decade since the publication of the first edition of “Explorations in Quantum Computing” the field has blossomed into a rich and diverse body of knowledge, and tremendous progress has been made on building functional quantum computer hardware. Yet I find that a discussion of applications of quantum computers still remains largely confined to Shor’s algorithm for factoring composite integers and Grover’s algorithm for quantum search. As more and more books have been written on quantum computing this standard presentation has been reinforced, thereby overlooking less well known, but arguably more interesting, applications.

In this edition I have tried to survey the field of quantum computing from a fresh perspective, showing how it can be applied to solve problems in a wide range of technical areas including physics, computer science, mathematics, chemistry, simulation, and finance. For sure, many of the newer quantum algorithms have their roots in Shor’s algorithm or Grover’s algorithm, but I think it is important to appreciate how the daughter algorithms have diverged from their parents. Moreover, there are now several quantum transforms known, such as the quantum wavelet and quantum cosine transforms, which show promising complexity properties and yet await exploitation in practical quantum algorithms. The classical versions of these transforms are of widespread utility in classical computing, especially signal and image processing, and I am optimistic that some fresh attention might stimulate others to find good uses for them.

The second edition is organized around four main parts. Part I addresses the question “What is Quantum Computing?” It provides the mathematical framework and physics concepts needed to understand quantum computing, and introduces the first quantum trick—quantum parallelism—and its use within the Deutsch-Jozsa algorithm. I assume the quantum circuit model but discuss several non-standard 2-qubit gates, such as SWAPα, iSWAP, and Berkeley B, that lend themselves more easily to implementation than does CNOT. In addition, I describe how to quantify the entangling power of quantum gates, and several techniques for constructing quantum circuits that achieve arbitrary n-qubit unitary, and non-unitary, operators including numerical, algebraic, and re-use methods, as well as specialized tricks for constructing optimal circuits for 2-qubit unitary operators.

(HTML tags aren't allowed.)

Java Web Services: Up and Running
Java Web Services: Up and Running
This example-driven book offers a thorough introduction to Java's APIs for XML Web Services (JAX-WS) and RESTful Web Services (JAX-RS). Java Web Services: Up and Running takes a clear, pragmatic approach to these technologies by providing a mix of architectural overview, complete working code examples, and short yet precise instructions for...
Discovering Requirements: How to Specify Products and Services
Discovering Requirements: How to Specify Products and Services
As information technology grows in power and reach, systems become more ambitious and more tightly integrated. The discipline of defining - or, perhaps, engineering - requirements becomes broader and deeper: it now embraces almost every project that aims to define a human or technical need and to find a means to satisfy it.

Inevitably,
...
Kengo Kuma: Selected Works
Kengo Kuma: Selected Works

Evanescent. Restrained. Ethereal. These are some of the words used to describe the architecture of Kengo Kuma, one of the most heralded of a new generation of Japanese architects. A recent article in Architecture writes of Kuma that "he strives to give his buildings the qualities of a rainbow, composed of shimmering particles,...


The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in...

Private Equity: Transforming Public Stock Into Private Equity to Create Value
Private Equity: Transforming Public Stock Into Private Equity to Create Value
"Harold Bierman has blended an excellent mix of important principles with real case study examples for a better understanding on a rather sophisticated finance subject."
–Edward M. Dudley, Vice President & General Auditor, ABB Americas

"The role of private equity firms in financing buyouts as well as providing...

MPLS and VPN Architectures, Vol. 2
MPLS and VPN Architectures, Vol. 2
MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.

MPLS and VPN...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy