In today’s digital infrastructure, the data-bits we use to send and process information can either be 0 or 1. Being able to correct possible errors that may occur in computations using these bits is a […]
In today’s digital infrastructure, the data-bits we use to send and process information can either be 0 or 1. Being able to correct possible errors that may occur in computations using these bits is a […]
Quantum 5, 555 (2021). https://doi.org/10.22331/q-2021-09-28-555 In a quantum measurement process, classical information about the measured system spreads throughout the environment. Meanwhile, quantum information about the system becomes inaccessible to local observers. Here we prove a […]
Quantum 5, 554 (2021). https://doi.org/10.22331/q-2021-09-28-554 We consider a model of quantum computation using qubits where it is possible to measure whether a given pair are in a singlet (total spin $0$) or triplet (total spin […]
Researchers have found a way to make ‘single-crystal flake’ devices that are so thin and free of defects, they have the potential to outperform components used today in quantum computer circuits. Click to rate this […]
Sorting a collection of shapes is child’s play. Circles here, squares there, triangles in their own pile. But if you take the task seriously, there’s a lot more to it. In fact, one of the […]
Quantum 5, 553 (2021). https://doi.org/10.22331/q-2021-09-28-553 Topological protection is employed in fault-tolerant error correction and in developing quantum algorithms with topological qubits. But, topological protection $textit{intrinsic to models being simulated}$, also robustly protects calculations, even on […]
Quantum 5, 552 (2021). https://doi.org/10.22331/q-2021-09-28-552 Given a Bell inequality, if its maximal quantum violation can be achieved only by a single set of measurements for each party or a single quantum state, up to local […]
Quantum 5, 551 (2021). https://doi.org/10.22331/q-2021-09-28-551 Multiple observers who independently harvest nonclassical correlations from a single physical system share the system’s ability to enable quantum correlations. We show that any number of independent observers can share […]
Computer security has become a bigger concern in the past year, due to sensational hack stories like the gasoline pipeline hack that occurred in May. Many have turned to quantum technology, specifically quantum encryption, to […]
Quantum 5, 550 (2021). https://doi.org/10.22331/q-2021-09-28-550 Constraint programming (CP) is a paradigm used to model and solve constraint satisfaction and combinatorial optimization problems. In CP, problems are modeled with constraints that describe acceptable solutions and solved […]
Recent Comments