| related words |
| reordering |
| rephrased |
| costly |
| summands |
| unused |
| hadamards |
| constructible |
| lanczos |
| reserved |
| kohout |
| richards |
| littlewood |
| rephrase |
| clustering |
| executes |
| enjoys |
| enjoyed |
| submanifolds |
| inspiring |
| remarking |
|
| related documents |
| Hypersensitivity and chaos signatures in the quantum baker's maps [0606102v2] |
| Mimicking Time Evolution within a Quantum Ground State: Ground-State
Quantum Computation, Cloning, and Teleportation [0312083v1] |
| Separability analyses of two-qubit density matrices [0408157v1] |
| In defence of naivete: The conceptual status of Lagrangian QFT [0112148v1] |
| Fundamental solution method applied to time evolution of two energy
level systems: exact and adiabatic limit results [0009108v5] |
| Teleportation of Atomic States via Cavity QED for a Cavity Prepared in a
Superposition of Zero and One Fock States [0410239v1] |
| Communication Complexity Protocol for Q-trits [0608156v1] |
| N Identical Particles Under Quantum Confinement: A Many-Body Dimensional
Perturbation Theory Approach II, The Lowest-Order Wave Function I [0603158v1] |
| Quantum computation via translation-invariant operations on a chain of
qubits [0505122v2] |
| Ex-house 2D finite-element simulation of the whispering-gallery modes of
arbitrarily shaped axisymmetric electromagnetic resonators [0607156v2] |
| Quantum Computing and Zeroes of Zeta Functions [0405081v1] |
| Distinguishability and Accessible Information in Quantum Theory [9601020v1] |
| Local Search Methods for Quantum Computers [9802043v1] |
| Fermionic coherent states for pseudo-Hermitian two-level systems [0608177v2] |
| Analog quantum error correction [9711021v1] |
| Experimental detection of entanglement via witness operators and local
measurements [0210134v2] |
| Mutually Unbiased Bases, Generalized Spin Matrices and Separability [0308142v2] |
| Description of Quantum Entanglement with Nilpotent Polynomials [0508234v2] |
| Quantum protocols for anonymous voting and surveying [0504161v2] |
| Optimization of coherent attacks in generalizations of the BB84 quantum
bit commitment protocol [0107042v2] |
|
| related topics |
| {state, algorithm, problem} |
| {classical, space, random} |
| {let, theorem, proof} |
| {cavity, atom, atoms} |
| {vol, operators, histories} |
| {energy, gaussian, time} |
| {key, protocol, security} |
| {states, state, optimal} |
| {operator, operators, space} |
| {group, space, representation} |
| {entanglement, phys, rev} |
| {error, code, errors} |
| {qubit, qubits, gate} |
| {equation, function, exp} |
| {theory, mechanics, state} |
| {bell, inequality, local} |
| {alice, bob, state} |
| {information, entropy, channel} |
| {time, decoherence, evolution} |
| {cos, sin, state} |
|