Results 31 to 40 of about 7,819 (154)

Effects of imperfections for Shor's factorization algorithm

open access: yes, 2007
We study effects of imperfections induced by residual couplings between qubits on the accuracy of Shor's algorithm using numerical simulations of realistic quantum computations with up to 30 qubits.
A. G. Fowler   +9 more
core   +1 more source

Implementing Shor's algorithm on Josephson Charge Qubits [PDF]

open access: yes, 2004
We investigate the physical implementation of Shor's factorization algorithm on a Josephson charge qubit register. While we pursue a universal method to factor a composite integer of any size, the scheme is demonstrated for the number 21.
A. V. Aho   +12 more
core   +1 more source

Quantum Period Finding is Compression Robust

open access: yes, 2021
We study quantum period finding algorithms such as Simon and Shor (and its variants Eker{\aa}-H{\aa}stad and Mosca-Ekert). For a periodic function $f$ these algorithms produce -- via some quantum embedding of $f$ -- a quantum superposition $\sum_x |x ...
May, Alexander, Schlieper, Lars
core  

Fourier-transforming with quantum annealers

open access: yesFrontiers in Physics, 2014
We introduce a set of quantum adiabatic evolutions that we argue may be used as `building blocks', or subroutines, in the onstruction of an adiabatic algorithm that executes Quantum Fourier Transform (QFT) with the same complexity and resources as its ...
Itay eHen
doaj   +1 more source

Statistical Assertions for Validating Patterns and Finding Bugs in Quantum Programs

open access: yes, 2019
In support of the growing interest in quantum computing experimentation, programmers need new tools to write quantum algorithms as program code. Compared to debugging classical programs, debugging quantum programs is difficult because programmers have ...
Beauregard Stephane   +7 more
core   +1 more source

Moose indifferent to canopy loss from forest disturbance by bark beetles

open access: yesThe Journal of Wildlife Management, EarlyView.
Moose showed strikingly similar patterns of habitat selection before and after widespread forest disturbance following an infestation of bark beetles. Our findings indicate that beetle‐kill does not appreciably alter habitat quality for moose and highlight the importance of riparian areas in sustaining moose as they contend with changing forests ...
Alexander B. May   +5 more
wiley   +1 more source

Quantum plug n’ play: modular computation in the quantum regime

open access: yesNew Journal of Physics, 2018
Classical computation is modular. It exploits plug n’ play architectures which allow us to use pre-fabricated circuits without knowing their construction.
Jayne Thompson   +3 more
doaj   +1 more source

A Resource Efficient Ising Model‐Based Quantum Sudoku Solver

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Quantum algorithms exploit superposition and parallelism to address complex combinatorial problems, many of which fall into the non‐polynomial (NP) class. Sudoku, a widely known logic‐based puzzle, is proven to be NP‐complete and thus presents a suitable testbed for exploring quantum optimization approaches.
Wen‐Li Wang   +5 more
wiley   +1 more source

Construction of a generalized Voronoi diagram with optimal placement of generator points based on the theory of optimal set partitioning

open access: yesМатематичні Студії, 2020
The problem of construction of a generalized Voronoi diagram with optimal placement of a finite number of generator points in a bounded set of \textit{n}-dimensional Euclidean space is considered.
E.M. Kiseleva   +3 more
doaj   +1 more source

Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm [PDF]

open access: yes, 2014
An efficient quantum modular exponentiation method is indispensible for Shor's factoring algorithm. But we find that all descriptions presented by Shor, Nielsen and Chuang, Markov and Saeedi, et al., are flawed.
Cao, Zhenfu, Cao, Zhengjun, Liu, Lihua
core   +1 more source

Home - About - Disclaimer - Privacy