Results 41 to 50 of about 6,692,619 (327)
The Quantum No-Stretching: A geometrical interpretation of the no-cloning theorem [PDF]
We consider the ideal situation in which a space rotation is transferred from a quantum spin j to a quantum spin l different from j. Quantum-information theoretical considerations lead to the conclusion that such operation is possible only for lj.
Alber +23 more
core +1 more source
Characterising a universal cloning machine by maximum-likelihood estimation [PDF]
We apply a general method for the estimation of completely positive maps to the 1-to-2 universal covariant cloning machine. The method is based on the maximum-likelihood principle, and makes use of random input states, along with random projective ...
A. Jamiołkowski +24 more
core +2 more sources
Optimizing completely positive maps using semidefinite programming [PDF]
Recently, a lot of attention has been devoted to finding physically realizable operations that realize as closely as possible certain desired transformations between quantum states, e.g., quantum cloning, teleportation, quantum gates, etc. Mathematically,
K. Audenaert, K. Audenaert, B. Moor
semanticscholar +1 more source
Stack Overflow in Github: Any Snippets There? [PDF]
When programmers look for how to achieve certain programming tasks, Stack Overflow is a popular destination in search engine results. Over the years, Stack Overflow has accumulated an impressive knowledge base of snippets of code that are amply ...
Di Yang +3 more
semanticscholar +1 more source
Incremental Clone Detection and Elimination for Erlang Programs [PDF]
A well-known bad code smell in refactoring and software maintenance is the existence of code clones, which are code fragments that are identical or similar to one another. This paper describes an approach to incrementally detecting 'similar' code based on the notion of least-general common abstraction, or anti-unification, as well as a framework for ...
Li H., Thompson S.
openaire +1 more source
Jupyter Notebooks on GitHub: Characteristics and Code Clones [PDF]
Jupyter notebooks have emerged as a standard tool for data science programming. Programs in Jupiter notebooks are different from typical programs by dividing code into snippets interleaved with text and visualisation and allowing interactive exploration ...
Malin Källén +2 more
semanticscholar +1 more source
Monogamy of Bell's inequality violations in non-signaling theories
We derive monogamy relations (tradeoffs) between strengths of violations of Bell's inequalities from the non-signaling condition. Our result applies to general Bell inequalities with an arbitrary large number of partners, outcomes and measurement ...
J. Bell +3 more
core +1 more source
Efficient Monitoring of Parametric Context Free Patterns [PDF]
Recent developments in runtime verification and monitoring show that parametric regular and temporal logic specifications can be efficiently monitored against large programs.
Chen, Feng +3 more
core +1 more source
Transgene-mediated programming is a preeminent strategy to direct cellular identity. To facilitate cell fate switching, lineage regulating genes must be efficiently and uniformly induced.
Renáta Bencsik +6 more
doaj +1 more source
State estimation from pair of conjugate qudits [PDF]
We show that, for $N$ parallel input states, an anti-linear map with respect to a specific basis is essentially a classical operator. We also consider the information contained in phase-conjugate pairs $|\phi > |\phi^*>$, and prove that there is more ...
D. J. Griffiths +5 more
core +1 more source

