
Fractionalization, Topological Order, and
... q-fold degeneracy. On the other hand, if the statistical angle does not match the fractional charge of the quasiparticles, we should have a larger degeneracy. When the quasiparticle statistics is non-Abelian, the exact counting is more complicated. Nevertheless, the minimum q-fold degeneracy still ...
... q-fold degeneracy. On the other hand, if the statistical angle does not match the fractional charge of the quasiparticles, we should have a larger degeneracy. When the quasiparticle statistics is non-Abelian, the exact counting is more complicated. Nevertheless, the minimum q-fold degeneracy still ...
Measurement Models for Quantum Zeno and anti
... the accompanying delocalization of phases then effectively destroys superpositions between macroscopically different states, so that the object appears to be in one or other of those states. Since a system in contact with an environment is generally in an entangled state with the latter it does not ...
... the accompanying delocalization of phases then effectively destroys superpositions between macroscopically different states, so that the object appears to be in one or other of those states. Since a system in contact with an environment is generally in an entangled state with the latter it does not ...
On the speed of fluctuations around
... giving the maximum difference in probability for any measurement on the two states7 . The meaning of equation (4) is that the average distance between the instantaneous state of the subsystem ρS (t) and the fixed state ωS will be small whenever the total dimension explored by the state (or the dimen ...
... giving the maximum difference in probability for any measurement on the two states7 . The meaning of equation (4) is that the average distance between the instantaneous state of the subsystem ρS (t) and the fixed state ωS will be small whenever the total dimension explored by the state (or the dimen ...
Past Research
... rings, such as Hopf algebras and group-graded algebras. My research program has involved collaborations with many mathematicians, including work with postdocs and graduate students. Below is a summary of some of my past research projects, which fall loosely into three categories: Hochschild cohomolo ...
... rings, such as Hopf algebras and group-graded algebras. My research program has involved collaborations with many mathematicians, including work with postdocs and graduate students. Below is a summary of some of my past research projects, which fall loosely into three categories: Hochschild cohomolo ...
Five Lecture Course on Basic Physics of
... • It is important that at such low temperatures a superconductor can be considered to be a single large quantum particle or molecule which is characterized by a single (BCS) wave function. • A huge amount of electrons is incorporated into a single quantum state. This is not possible for normal elect ...
... • It is important that at such low temperatures a superconductor can be considered to be a single large quantum particle or molecule which is characterized by a single (BCS) wave function. • A huge amount of electrons is incorporated into a single quantum state. This is not possible for normal elect ...
Nature’s Queer Performativity “O 25
... heaven forfend, both)! That said, it would be a serious error to conclude that I am out to recount the sins of anthropomorphizing. On the contrary, I am deeply interested in ‘anthropomorphizing’ as an intervention for shaking loose the crusty toxic scales of anthropocentricism, where the human in it ...
... heaven forfend, both)! That said, it would be a serious error to conclude that I am out to recount the sins of anthropomorphizing. On the contrary, I am deeply interested in ‘anthropomorphizing’ as an intervention for shaking loose the crusty toxic scales of anthropocentricism, where the human in it ...
litera_1
... organism was made evident. These are two points that shall be elaborated on further during the course of this section. Some genes code for the sequence of amino acids in the primary structure of proteins, others code for the control of protein synthesis. But this alone cannot account for form as we ...
... organism was made evident. These are two points that shall be elaborated on further during the course of this section. Some genes code for the sequence of amino acids in the primary structure of proteins, others code for the control of protein synthesis. But this alone cannot account for form as we ...
m NV Centers in Quantum Information Technology ! De-Coherence Protection &
... N. B. Manson et al. Phys. Rev. B 47, 104303 (2006). ! V. Jacques et al. Phys. Rev. Lett. 102, 057403 (2011). ! FIG. 2 (color online). Nuclear-spin polarization mechanism. ...
... N. B. Manson et al. Phys. Rev. B 47, 104303 (2006). ! V. Jacques et al. Phys. Rev. Lett. 102, 057403 (2011). ! FIG. 2 (color online). Nuclear-spin polarization mechanism. ...
The Uncertainty Principle
... where ℏ = h/2π, h denotes Planck's constant, and boldface type is used to represent matrices. The new theory scored spectacular empirical success by encompassing nearly all spectroscopic data known at the time, especially after the concept of the electron spin was included in the theoretical framewo ...
... where ℏ = h/2π, h denotes Planck's constant, and boldface type is used to represent matrices. The new theory scored spectacular empirical success by encompassing nearly all spectroscopic data known at the time, especially after the concept of the electron spin was included in the theoretical framewo ...
Time dependence in quantum mechanics
... and its environment E. In the limit that the environment is so large (precisely what this means depends upon the object under discussion) that E is practically unchanged in its interaction with S, it can be treated semiclassically. In this limit the variables of the environment undergo a time develo ...
... and its environment E. In the limit that the environment is so large (precisely what this means depends upon the object under discussion) that E is practically unchanged in its interaction with S, it can be treated semiclassically. In this limit the variables of the environment undergo a time develo ...
Monte Carlo Simulations of Quantum Spin Models - cond
... physics models is assumed, and can be obtained for example from the lecture of W. Krauth in this volume. In devising QMC simulation methods, two major steps need to be taken: (i) The quantum partition function must be reformulated in a way as to allow stochastic sampling over a space of effective co ...
... physics models is assumed, and can be obtained for example from the lecture of W. Krauth in this volume. In devising QMC simulation methods, two major steps need to be taken: (i) The quantum partition function must be reformulated in a way as to allow stochastic sampling over a space of effective co ...
Quantum key distribution
Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often incorrectly called quantum cryptography, as it is the most well known example of the group of quantum cryptographic tasks.An important and unique property of quantum key distribution is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. This results from a fundamental aspect of quantum mechanics: the process of measuring a quantum system in general disturbs the system. A third party trying to eavesdrop on the key must in some way measure it, thus introducing detectable anomalies. By using quantum superpositions or quantum entanglement and transmitting information in quantum states, a communication system can be implemented which detects eavesdropping. If the level of eavesdropping is below a certain threshold, a key can be produced that is guaranteed to be secure (i.e. the eavesdropper has no information about it), otherwise no secure key is possible and communication is aborted.The security of encryption that uses quantum key distribution relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping at any point in the communication process, or any mathematical proof as to the actual complexity of reversing the one-way functions used. QKD has provable security based on information theory, and forward secrecy.Quantum key distribution is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen encryption algorithm to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel. The algorithm most commonly associated with QKD is the one-time pad, as it is provably secure when used with a secret, random key. In real world situations, it is often also used with encryption using symmetric key algorithms like the Advanced Encryption Standard algorithm. In the case of QKD this comparison is based on the assumption of perfect single-photon sources and detectors, that cannot be easily implemented.