Results 211 to 220 of about 2,942,043 (344)
The hybrid approach to Quantum Supervised Machine Learning is compatible with Noisy Intermediate Scale Quantum (NISQ) devices but hardly useful. Pure quantum kernels requiring fault‐tolerant quantum computers are more promising. Examples are kernels computed by means of the Quantum Fourier Transform (QFT) and kernels defined via the calculation of ...
Massimiliano Incudini+2 more
wiley +1 more source
New combinatorial formulae for nested Bethe vectors II. [PDF]
Kosmakov M, Tarasov V.
europepmc +1 more source
Admissibility of C*-Covers for Operator Algebra Dynamical Systems [PDF]
Mitch Hamidi
openalex +1 more source
Coverings of algebraic groups and Lie algebras of classical type [PDF]
openaire +3 more sources
The role of identification in data‐driven policy iteration: A system theoretic study
Abstract The goal of this article is to study fundamental mechanisms behind so‐called indirect and direct data‐driven control for unknown systems. Specifically, we consider policy iteration applied to the linear quadratic regulator problem. Two iterative procedures, where data collected from the system are repeatedly used to compute new estimates of ...
Bowen Song, Andrea Iannelli
wiley +1 more source
Symplectic Geometry of Teichmüller Spaces for Surfaces with Ideal Boundary. [PDF]
Alekseev A, Meinrenken E.
europepmc +1 more source
Cyclic covers of an algebraic curve from an adelic viewpoint [PDF]
Luis M. Navas+1 more
openalex +1 more source
Initial State Privacy of Nonlinear Systems on Riemannian Manifolds
ABSTRACT In this paper, we investigate initial state privacy protection for discrete‐time nonlinear closed systems. By capturing Riemannian geometric structures inherent in such privacy challenges, we refine the concept of differential privacy through the introduction of an initial state adjacency set based on Riemannian distances.
Le Liu, Yu Kawano, Antai Xie, Ming Cao
wiley +1 more source
Multifunctional Au-Ag-Cr Nanocomposites: From Multiplex Sensing and Advanced Logic Computing to Scalable Information Protection. [PDF]
Zhou J+5 more
europepmc +1 more source
Finitely Generated Varieties of Commutative BCK-algebras: Covers [PDF]
Václav Cenker
openalex +1 more source