Logo

Quantum Computing Since Democritus

Large book cover: Quantum Computing Since Democritus

Quantum Computing Since Democritus
by

Publisher: University of Waterloo
ISBN/ASIN: 0521199565
Number of pages: 398

Description:
This course tries to connect quantum computing to the wider intellectual world. We'll start out with various scientific, mathematical, or philosophical problems that predate quantum computing: for example, the measurement problem, P versus NP, the existence of secure cryptography, the Humean problem of induction, or the possibility of closed timelike curves. We'll then examine in what ways, if any, quantum computing affects how we should think about the problem.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Quantum Information TheoryQuantum Information Theory
by - ETH Zurich
Processing of information is necessarily a physical process. It is not surprising that physics and the theory of information are inherently connected. Quantum information theory is a research area whose goal is to explore this connection.
(12597 views)
Book cover: Introduction to Quantum Cellular AutomataIntroduction to Quantum Cellular Automata
by - arXiv
In this text the authors attempt to provide a useful introduction to quantum cellular automata from a computing perspective. For clarity and accessibility they provide a brief overview of both quantum computing and classical cellular automata.
(10278 views)
Book cover: Quantum Information TheoryQuantum Information Theory
by - arXiv
A short review of ideas in quantum information theory. Quantum mechanics is presented together with some useful tools for quantum mechanics of open systems. The treatment is pedagogical and suitable for beginning graduates in the field.
(16607 views)
Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(13949 views)