Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Explorations in Quantum Computing (Texts in Computer Science)

Buy

In the decade since the publication of the first edition of “Explorations in Quantum Computing” the field has blossomed into a rich and diverse body of knowledge, and tremendous progress has been made on building functional quantum computer hardware. Yet I find that a discussion of applications of quantum computers still remains largely confined to Shor’s algorithm for factoring composite integers and Grover’s algorithm for quantum search. As more and more books have been written on quantum computing this standard presentation has been reinforced, thereby overlooking less well known, but arguably more interesting, applications.

In this edition I have tried to survey the field of quantum computing from a fresh perspective, showing how it can be applied to solve problems in a wide range of technical areas including physics, computer science, mathematics, chemistry, simulation, and finance. For sure, many of the newer quantum algorithms have their roots in Shor’s algorithm or Grover’s algorithm, but I think it is important to appreciate how the daughter algorithms have diverged from their parents. Moreover, there are now several quantum transforms known, such as the quantum wavelet and quantum cosine transforms, which show promising complexity properties and yet await exploitation in practical quantum algorithms. The classical versions of these transforms are of widespread utility in classical computing, especially signal and image processing, and I am optimistic that some fresh attention might stimulate others to find good uses for them.

The second edition is organized around four main parts. Part I addresses the question “What is Quantum Computing?” It provides the mathematical framework and physics concepts needed to understand quantum computing, and introduces the first quantum trick—quantum parallelism—and its use within the Deutsch-Jozsa algorithm. I assume the quantum circuit model but discuss several non-standard 2-qubit gates, such as SWAPα, iSWAP, and Berkeley B, that lend themselves more easily to implementation than does CNOT. In addition, I describe how to quantify the entangling power of quantum gates, and several techniques for constructing quantum circuits that achieve arbitrary n-qubit unitary, and non-unitary, operators including numerical, algebraic, and re-use methods, as well as specialized tricks for constructing optimal circuits for 2-qubit unitary operators.

(HTML tags aren't allowed.)

Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
This volume brings together, through a peer-revision process, the advanced research results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal and Nonverbal Communication, primarily discussed for the first time at the Second COST 2102 International Training School on “Development of Multimodal...
Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

Pro Silverlight 2 in VB 2008 (Expert's Voice in Web Development)
Pro Silverlight 2 in VB 2008 (Expert's Voice in Web Development)
Silverlight is a framework for building rich, browser-hosted applications that run on a variety of operating systems. Silverlight works its magic through a browser plug-in. When you surf to a web page that includes some Silverlight content, this browser plug-in runs, executes the code, and renders that content in a specifically designated region of...

HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)
HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)

Forty years ago, the age-old battle against infectious diseases as a major threat to human health was believed close to being won. However, by the late twentieth century, the increase of emerging and reemerging infectious diseases was evident in both low and high income countries. About 30 new infectious diseases have been identified in the...

Neural Network Programming with Java
Neural Network Programming with Java

Create and unleash the power of neural networks by implementing professional Java code

About This Book

  • Learn to build amazing projects using neural networks including forecasting the weather and pattern recognition
  • Explore the Java multi-platform feature to run your personal neural...
Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy