• Aucun résultat trouvé

quantum computing

Contributions to handwriting recognition using deep neural networks and quantum computing

Contributions to handwriting recognition using deep neural networks and quantum computing

... reasonably-sized quantum computer of several hundreds of ...on quantum neural networks is only in its ...the quantum improvements our work suggests held and generalized to more settings and tasks, ...

196

Quantum computing assisted medium access control for multiple client station networks

Quantum computing assisted medium access control for multiple client station networks

... a quantum computing-based MAC protocol is ...of quantum entanglement, we present three new such quantum computing-assited MAC protocols, namely, ...

19

Accelerating lattice quantum field theory calculations via interpolator optimization using noisy intermediate-scale quantum computing

Accelerating lattice quantum field theory calculations via interpolator optimization using noisy intermediate-scale quantum computing

... large quantum systems that would be needed for a direct calculation of the physics of interest on the quantum machine, but can still accelerate the classical calculation analogously to a classical ...

7

Si MOS technology for spin-based quantum computing

Si MOS technology for spin-based quantum computing

... of quantum bits, spins in Si offer an interesting trade-off between fast manipulation and ...scalable quantum computer; ...of Quantum Error Correction (QEC) codes for large-scale fault-tolerant ...

7

Relativistic quantum chemistry on quantum computers

Relativistic quantum chemistry on quantum computers

... 31.15.aj Quantum computing [ 1 ] is one of the fastest growing fields of computer ...where quantum computing offers an exponential speedup over its classical counterpart [ 2 ...from ...

6

Quantum Canada

Quantum Canada

... and quantum-material based devices as a foundational enabling ...for quantum technologies, including photon-matter interfaces, spin-based qubits, and superconducting ...of quantum as the next big ...

7

On group theory for quantum gates and quantum coherence

On group theory for quantum gates and quantum coherence

... Currently quantum computing is a very active and respectable area of research at the interface of the three pillars: quantum physics, mathematics and computer ...large-scale quantum computers ...

11

2D quantum turbulence in a polariton quantum fluid

2D quantum turbulence in a polariton quantum fluid

... case of conservative quantum fluids. Such description of the polariton fluid cor- responds to the limiting case of long lifetime and fast relaxation processes [60]. It is valid for pulsed excitation case with ...

46

Allocation de ressources dans le cloud computing

Allocation de ressources dans le cloud computing

... L'événement qui déclenche la procédure de SWDP est la réception d'une nouvelle offre, puisque le vendeur ne peut satisfaire d'offre au-delà de ses capacités et devra donc vérifier si oui ou non il peut satisfaire la ...

182

Quantum centipedes: collective dynamics of interacting quantum walkers

Quantum centipedes: collective dynamics of interacting quantum walkers

... the quantum centipede made of N fermionic quantum walkers on the one-dimensional lattice interacting by means of the simplest of all hard-bound constraints: the distance between two consecutive fermions is ...

21

Quantum coherence in the integer quantum Hall regime

Quantum coherence in the integer quantum Hall regime

... the visibility provides a direct measurement of the decoher- ence and/or phase averaging in this quantum circuit. In Ref. 1, 60% visibility was observed at low temperature, showing that the quantum ...

182

Computing Pareto Optimal Committees

Computing Pareto Optimal Committees

... though computing some Pareto optimal committee is ...even computing a Pareto optimal outcome is ...of computing and verifying Pareto optimal outcomes admit polynomial-time ...

7

From open quantum systems to open quantum maps

From open quantum systems to open quantum maps

... open quantum systems satisfying a natural dynamical assumption (see ...open quantum maps, that is of finite dimensional quantizations of canonical relations obtained by truncation of symplectomorphisms ...

54

Computing the rates of measurement-induced quantum jumps

Computing the rates of measurement-induced quantum jumps

... open quantum sys- tem that is continuously measured has an evolution that gets jumpy when the measurement process ...that quantum jumps are ubiqui- tous in the sense that any quantum system subjected ...

10

Computing in Social Networks

Computing in Social Networks

... Secure computing in a Social network. Whereas scalability characterizes the spatial, computational and message complexity of the computation, the secure aspect of S 3 encompasses accuracy and privacy. Accuracy ...

17

On computing the Gromov hyperbolicity

On computing the Gromov hyperbolicity

... In this section, we show that the cost of pre-processing, and more precisely the computation time of the LMA from the LBC, is greatly balanced by the reduction of the computation time of the hyperbolicity on the LMA ...

20

Computing minimal Gorenstein covers

Computing minimal Gorenstein covers

... Finally, in section 6 we provide several examples of the minimal Gorenstein covers variety and list the comptutation times of M GC(A) for all analytic types of k-algebras with gcl(A) ≤ 2[r] ...

31

Computing $L$-Functions: A Survey

Computing $L$-Functions: A Survey

... de Bordeaux 27 (2015), 699–726 Computing L-Functions: A Survey par Henri COHEN Résumé. Nous donnons un certain nombre de methodes pour le calcul de fonctions L, y compris de degré strictement plus grand que 2. ...

29

Le Checkpointing Pour Les Bots Dans Le Cloud Computing

Le Checkpointing Pour Les Bots Dans Le Cloud Computing

... Cloud Computing est apparu pour certains comme une révolution et pour d'autres comme un simple terme de Marketing qui ne fait que rassembler des services et des technologies qui existent depuis ...cloud ...

56

Computing in Social Networks

Computing in Social Networks

... Differential privacy [14] and k-anonymity [15] are two common ways to ex- press privacy in the context of distributed computations on sensitive databases. Contrary to AG-S3, where faulty nodes take part in the ...

16

Show all 2241 documents...

Sujets connexes