<--- Back to Details
First PageDocument Content
Quantum mechanics / Physics / Theoretical computer science / Quantum information science / Quantum states / Quantum computing / Information theory / Qubit / Mathematical formulation of quantum mechanics / Unitary matrix / Quantum superposition / Matrix
Date: 2018-08-29 13:55:03
Quantum mechanics
Physics
Theoretical computer science
Quantum information science
Quantum states
Quantum computing
Information theory
Qubit
Mathematical formulation of quantum mechanics
Unitary matrix
Quantum superposition
Matrix

Lecture 3, Tues Jan 24: Basic Rules of QM Tensor products are a way of building bigger vectors out of smaller ones. Let’s apply a NOT operation to the first bit, and do nothing to the second bit. That’s really the sa

Add to Reading List

Source URL: www.scottaaronson.com

Download Document from Source Website

File Size: 533,46 KB

Share Document on Facebook

Similar Documents

Lecture 27, Thurs April 27: Quantum Error Correction At the end of the last lecture, we discussed some of the difficulties with achieving a quantum speedup using currently available quantum computing devices, like D-Wave

Lecture 27, Thurs April 27: Quantum Error Correction At the end of the last lecture, we discussed some of the difficulties with achieving a quantum speedup using currently available quantum computing devices, like D-Wave

DocID: 1xVv9 - View Document

Lecture 17, Thurs March 23: Quantum Query Complexity, Deutsch-Jozsa People often want to know where the true power of quantum computing comes from. ● Is it the ability of amplitudes to interfere with one another? ● I

Lecture 17, Thurs March 23: Quantum Query Complexity, Deutsch-Jozsa People often want to know where the true power of quantum computing comes from. ● Is it the ability of amplitudes to interfere with one another? ● I

DocID: 1xVqy - View Document

Lecture 16, Tues March 21: Quantum Computing, Universal Gate Sets Guest Lecture by Tom Wong Having seen lots of quantum protocols, we’re finally ready to tackle the holy grail of the field: a programmable quantum compu

Lecture 16, Tues March 21: Quantum Computing, Universal Gate Sets Guest Lecture by Tom Wong Having seen lots of quantum protocols, we’re finally ready to tackle the holy grail of the field: a programmable quantum compu

DocID: 1xUtD - View Document

Lecture 29, Thurs May 4: Experimental Realizations of QC In this course, we’ve had 28 lectures about the theory of quantum computing and information. So it behooves us to take one lecture to survey the current state of

Lecture 29, Thurs May 4: Experimental Realizations of QC In this course, we’ve had 28 lectures about the theory of quantum computing and information. So it behooves us to take one lecture to survey the current state of

DocID: 1xTQp - View Document

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

DocID: 1xTFq - View Document