Results 41 to 50 of about 102,454 (262)

Improved maximum-likelihood quantum amplitude estimation

open access: yes, 2022
Quantum amplitude estimation is a key subroutine in a number of powerful quantum algorithms, including quantum-enhanced Monte Carlo simulation and quantum machine learning. Maximum-likelihood quantum amplitude estimation (MLQAE) is one of a number of recent approaches that employ much simpler quantum circuits than the original algorithm based on ...
Callison, Adam, Browne, Dan E.
openaire   +2 more sources

Adaptive Algorithm for Quantum Amplitude Estimation

open access: yes, 2022
Quantum amplitude estimation is a key sub-routine of a number of quantum algorithms with various applications. We propose an adaptive algorithm for interval estimation of amplitudes. The quantum part of the algorithm is based only on Grover's algorithm.
Zhao, Yunpeng   +5 more
openaire   +2 more sources

Quantum advantage of Monte Carlo option pricing

open access: yesJournal of Physics Communications, 2023
Quantum computers have the potential to provide quadratic speedup for Monte Carlo methods currently used in various classical applications. In this work, we examine the advantage of quantum computers for financial option pricing with the Monte Carlo ...
Zoltán Udvarnoki   +2 more
doaj   +1 more source

Optimal polynomial based quantum eigenstate filtering with application to solving quantum linear systems [PDF]

open access: yesQuantum, 2020
We present a quantum eigenstate filtering algorithm based on quantum signal processing (QSP) and minimax polynomials. The algorithm allows us to efficiently prepare a target eigenstate of a given Hamiltonian, if we have access to an initial state with ...
Lin Lin, Yu Tong
doaj   +1 more source

Joint quantum estimation of loss and nonlinearity in driven-dissipative Kerr resonators

open access: yesPhysical Review Research, 2023
We address multiparameter quantum estimation for coherently driven nonlinear Kerr resonators in the presence of loss. In particular, we consider the realistic situation in which the parameters of interest are the loss rate and the nonlinear coupling ...
Muhammad Asjad   +2 more
doaj   +1 more source

Recovery With Incomplete Knowledge: Fundamental Bounds on Real-Time Quantum Memories [PDF]

open access: yesQuantum, 2023
The recovery of fragile quantum states from decoherence is the basis of building a quantum memory, with applications ranging from quantum communications to quantum computing.
Arshag Danageozian
doaj   +1 more source

Grand Unification of Quantum Algorithms

open access: yesPRX Quantum, 2021
Quantum algorithms offer significant speed-ups over their classical counterparts for a variety of problems. The strongest arguments for this advantage are borne by algorithms for quantum search, quantum phase estimation, and Hamiltonian simulation, which
John M. Martyn   +3 more
doaj   +1 more source

Direct Application of the Phase Estimation Algorithm to Find the Eigenvalues of the Hamiltonians [PDF]

open access: yes, 2008
The eigenvalue of a Hamiltonian, $\mathcal{H}$, can be estimated through the phase estimation algorithm given the matrix exponential of the Hamiltonian, $exp(-i\mathcal{H})$.
de Sene, Renata Karina   +6 more
core   +5 more sources

Linear regression by quantum amplitude estimation and its extension to convex optimization [PDF]

open access: yesPhysical Review A, 2021
Linear regression is a basic and widely-used methodology in data analysis. It is known that some quantum algorithms efficiently perform least squares linear regression of an exponentially large data set. However, if we obtain values of the regression coefficients as classical data, the complexity of the existing quantum algorithms can be larger than ...
Kazuya Kaneko   +3 more
openaire   +2 more sources

Complete elimination of information leakage in continuous-variable quantum communication channels [PDF]

open access: yes, 2018
In all lossy communication channels realized to date, information is inevitably leaked to a potential eavesdropper. Here we present a communication protocol that does not allow for any information leakage to a potential eavesdropper in a purely lossy ...
Andersen, Ulrik L.   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy