Dynamics of Classical Wave Scattering by Small Obstacles
... is second order in the time derivative, whereas “quantum” particle waves are governed by the Schrödinger equation which is first order in ≠兾≠t. Scalar classical waves at a fixed frequency v are thus equivalent to a particle wave at energy E ⬃ v 2 . The analogies between the classical and quantum pro ...
... is second order in the time derivative, whereas “quantum” particle waves are governed by the Schrödinger equation which is first order in ≠兾≠t. Scalar classical waves at a fixed frequency v are thus equivalent to a particle wave at energy E ⬃ v 2 . The analogies between the classical and quantum pro ...
61, 062310 (2000)
... into two main categories: deterministic and probabilistic. The deterministic quantum cloning machine generates approximate copies and further we get two subcategories: universal and state-dependent. Universal quantum cloning machines, first addressed by Bužek and Hillery 关8兴, act on any unknown qua ...
... into two main categories: deterministic and probabilistic. The deterministic quantum cloning machine generates approximate copies and further we get two subcategories: universal and state-dependent. Universal quantum cloning machines, first addressed by Bužek and Hillery 关8兴, act on any unknown qua ...
Probing order beyond the Landau paradigm
... Classification of fixed surfaces 2. Impose some symmetry (invariance under |i> Oij|j>): - Can classify possibilities for each group G - Fixed surfaces {Proj. rep. of G such that is a rep. of G} ...
... Classification of fixed surfaces 2. Impose some symmetry (invariance under |i> Oij|j>): - Can classify possibilities for each group G - Fixed surfaces {Proj. rep. of G such that is a rep. of G} ...
Spacetime physics with geometric algebra
... matrices, appearing so mysteriously in relativistic quantum mechanics: The Dirac matrices are no more and no less than matrix representations of an orthonormal frame of spacetime vectors and thereby they characterize spacetime geometry. But how can this be? Dirac never said any such thing! And physi ...
... matrices, appearing so mysteriously in relativistic quantum mechanics: The Dirac matrices are no more and no less than matrix representations of an orthonormal frame of spacetime vectors and thereby they characterize spacetime geometry. But how can this be? Dirac never said any such thing! And physi ...
Quantum refrigerators and the third law of thermodynamics
... regime involves time-averaging procedures eliminating certain oscillating terms. This procedure makes sense only if the corresponding Bohr frequencies are well-separated. In our case, it means that ωc− should be well separated from ωc+ , which implies that λ ∼ ωc . Indeed, if both ωc and λ vanish, t ...
... regime involves time-averaging procedures eliminating certain oscillating terms. This procedure makes sense only if the corresponding Bohr frequencies are well-separated. In our case, it means that ωc− should be well separated from ωc+ , which implies that λ ∼ ωc . Indeed, if both ωc and λ vanish, t ...
Quantum computation of scattering in scalar quantum field theories
... large amount of effort devoted to finding additional quantum algorithms offering exponential speedup. This turns out to be very difficult. At present, only relatively few problems have been discovered admitting exponential quantum speedup [7], including simulating nonrelativistic many-body quantum s ...
... large amount of effort devoted to finding additional quantum algorithms offering exponential speedup. This turns out to be very difficult. At present, only relatively few problems have been discovered admitting exponential quantum speedup [7], including simulating nonrelativistic many-body quantum s ...
pdf
... in general a classical algorithm for this would require Ω(1/δ) steps. This basic algorithm has been refined, taking into account the number of solutions and the desired final success probability 1 − . For example, Buhrman, Cleve, de Wolf and Zalka [BC+99] obtained the following: Theorem [BC+99]: Fi ...
... in general a classical algorithm for this would require Ω(1/δ) steps. This basic algorithm has been refined, taking into account the number of solutions and the desired final success probability 1 − . For example, Buhrman, Cleve, de Wolf and Zalka [BC+99] obtained the following: Theorem [BC+99]: Fi ...
Quantum Field Theory on Curved Backgrounds. I
... Lorentzian spacetimes of interest may not be sections of 4-dimensional complex manifolds which also have Riemannian sections, and even if they are, the Riemannian section need not be unique. Thus, the general picture of extracting physics from the Euclidean approach is a difficult one where further ...
... Lorentzian spacetimes of interest may not be sections of 4-dimensional complex manifolds which also have Riemannian sections, and even if they are, the Riemannian section need not be unique. Thus, the general picture of extracting physics from the Euclidean approach is a difficult one where further ...
QUANTUM SPIN LIQUIDS: QUEST FOR THE ODD PARTICLE
... quantum Hall state of ordinary charge-e electrons can exhibit particle-like excitations which carry charge, even though the constituent electron is, by itself, perfectly robust against such splintering. More recent examples include electrically insulating solids which support excitations that slight ...
... quantum Hall state of ordinary charge-e electrons can exhibit particle-like excitations which carry charge, even though the constituent electron is, by itself, perfectly robust against such splintering. More recent examples include electrically insulating solids which support excitations that slight ...
Quantum Mechanics as Quantum Information (and only a little more)
... we call spacetime—a mathematical object, the study of which one can hope will tell us something about nature itself, not merely about the observer in nature. The dream I see for quantum mechanics is just this. Weed out all the terms that have to do with gambling commitments, information, knowledge, ...
... we call spacetime—a mathematical object, the study of which one can hope will tell us something about nature itself, not merely about the observer in nature. The dream I see for quantum mechanics is just this. Weed out all the terms that have to do with gambling commitments, information, knowledge, ...
Spin States in Graphene Quantum Dots
... Spin qubits in quantum dots [1] are interesting candidates for the implementation of future quantum information processing. Single spin preparation, manipulation, and readout has so far been demonstrated predominately in GaAs-based systems [2,3]. Spin coherence times in such systems are limited by h ...
... Spin qubits in quantum dots [1] are interesting candidates for the implementation of future quantum information processing. Single spin preparation, manipulation, and readout has so far been demonstrated predominately in GaAs-based systems [2,3]. Spin coherence times in such systems are limited by h ...
On the interaction of mesoscopic quantum systems with gravity
... • As far as the relation of quantum theory with gravity is concerned, this is the only level where experiments have been either performed or have been suggested. A clear understanding of this interaction would thus be crucial for the development of quantum gravity. It could, in particular, help to o ...
... • As far as the relation of quantum theory with gravity is concerned, this is the only level where experiments have been either performed or have been suggested. A clear understanding of this interaction would thus be crucial for the development of quantum gravity. It could, in particular, help to o ...
Countermeasure against tailored bright illumination attack for DPS
... however, note that the security proof is based on certain assumptions on its physical implementation, such as the eavesdropper should have no access to Alice’s transmitter and Bob’s receiver, and their devices should operate as required by the protocol [4]. In practice, however, it is often the case ...
... however, note that the security proof is based on certain assumptions on its physical implementation, such as the eavesdropper should have no access to Alice’s transmitter and Bob’s receiver, and their devices should operate as required by the protocol [4]. In practice, however, it is often the case ...