305 research outputs found
Strongly Universal Reversible Gate Sets
It is well-known that the Toffoli gate and the negation gate together yield a
universal gate set, in the sense that every permutation of can be
implemented as a composition of these gates. Since every bit operation that
does not use all of the bits performs an even permutation, we need to use at
least one auxiliary bit to perform every permutation, and it is known that one
bit is indeed enough. Without auxiliary bits, all even permutations can be
implemented. We generalize these results to non-binary logic: If is a
finite set of odd cardinality then a finite gate set can generate all
permutations of for all , without any auxiliary symbols. If the
cardinality of is even then, by the same argument as above, only even
permutations of can be implemented for large , and we show that indeed
all even permutations can be obtained from a finite universal gate set. We also
consider the conservative case, that is, those permutations of that
preserve the weight of the input word. The weight is the vector that records
how many times each symbol occurs in the word. It turns out that no finite
conservative gate set can, for all , implement all conservative even
permutations of without auxiliary bits. But we provide a finite gate set
that can implement all those conservative permutations that are even within
each weight class of .Comment: Submitted to Rev Comp 201
On-line construction of position heaps
We propose a simple linear-time on-line algorithm for constructing a position
heap for a string [Ehrenfeucht et al, 2011]. Our definition of position heap
differs slightly from the one proposed in [Ehrenfeucht et al, 2011] in that it
considers the suffixes ordered from left to right. Our construction is based on
classic suffix pointers and resembles the Ukkonen's algorithm for suffix trees
[Ukkonen, 1995]. Using suffix pointers, the position heap can be extended into
the augmented position heap that allows for a linear-time string matching
algorithm [Ehrenfeucht et al, 2011].Comment: to appear in Journal of Discrete Algorithm
Theory of Dicke narrowing in coherent population trapping
The Doppler effect is one of the dominant broadening mechanisms in thermal
vapor spectroscopy. For two-photon transitions one would naively expect the
Doppler effect to cause a residual broadening, proportional to the wave-vector
difference. In coherent population trapping (CPT), which is a narrow-band
phenomenon, such broadening was not observed experimentally. This has been
commonly attributed to frequent velocity-changing collisions, known to narrow
Doppler-broadened one-photon absorption lines (Dicke narrowing). Here we show
theoretically that such a narrowing mechanism indeed exists for CPT resonances.
The narrowing factor is the ratio between the atom's mean free path and the
wavelength associated with the wave-vector difference of the two radiation
fields. A possible experiment to verify the theory is suggested.Comment: 6 pages, 2 figures; Introduction revise
The ideal energy of classical lattice dynamics
We define, as local quantities, the least energy and momentum allowed by
quantum mechanics and special relativity for physical realizations of some
classical lattice dynamics. These definitions depend on local rates of
finite-state change. In two example dynamics, we see that these rates evolve
like classical mechanical energy and momentum.Comment: 12 pages, 4 figures, includes revised portion of arXiv:0805.335
A Probabilistic Analysis of Kademlia Networks
Kademlia is currently the most widely used searching algorithm in P2P
(peer-to-peer) networks. This work studies an essential question about Kademlia
from a mathematical perspective: how long does it take to locate a node in the
network? To answer it, we introduce a random graph K and study how many steps
are needed to locate a given vertex in K using Kademlia's algorithm, which we
call the routing time. Two slightly different versions of K are studied. In the
first one, vertices of K are labelled with fixed IDs. In the second one,
vertices are assumed to have randomly selected IDs. In both cases, we show that
the routing time is about c*log(n), where n is the number of nodes in the
network and c is an explicitly described constant.Comment: ISAAC 201
Clifford algebras and universal sets of quantum gates
In this paper is shown an application of Clifford algebras to the
construction of computationally universal sets of quantum gates for -qubit
systems. It is based on the well-known application of Lie algebras together
with the especially simple commutation law for Clifford algebras, which states
that all basic elements either commute or anticommute.Comment: 4 pages, REVTeX (2 col.), low-level language corrections, PR
Simple Realization Of The Fredkin Gate Using A Series Of Two-body Operators
The Fredkin three-bit gate is universal for computational logic, and is
reversible. Classically, it is impossible to do universal computation using
reversible two-bit gates only. Here we construct the Fredkin gate using a
combination of six two-body reversible (quantum) operators.Comment: Revtex 3.0, 7 pages, 3 figures appended at the end, please refer to
the comment lines at the beginning of the manuscript for reasons of
replacemen
The quantum speed up as advanced knowledge of the solution
With reference to a search in a database of size N, Grover states: "What is
the reason that one would expect that a quantum mechanical scheme could
accomplish the search in O(square root of N) steps? It would be insightful to
have a simple two line argument for this without having to describe the details
of the search algorithm". The answer provided in this work is: "because any
quantum algorithm takes the time taken by a classical algorithm that knows in
advance 50% of the information that specifies the solution of the problem".
This empirical fact, unnoticed so far, holds for both quadratic and exponential
speed ups and is theoretically justified in three steps: (i) once the physical
representation is extended to the production of the problem on the part of the
oracle and to the final measurement of the computer register, quantum
computation is reduction on the solution of the problem under a relation
representing problem-solution interdependence, (ii) the speed up is explained
by a simple consideration of time symmetry, it is the gain of information about
the solution due to backdating, to before running the algorithm, a
time-symmetric part of the reduction on the solution; this advanced knowledge
of the solution reduces the size of the solution space to be explored by the
algorithm, (iii) if I is the information acquired by measuring the content of
the computer register at the end of the algorithm, the quantum algorithm takes
the time taken by a classical algorithm that knows in advance 50% of I, which
brings us to the initial statement.Comment: 23 pages, to be published in IJT
Time and Space Bounds for Reversible Simulation
We prove a general upper bound on the tradeoff between time and space that
suffices for the reversible simulation of irreversible computation. Previously,
only simulations using exponential time or quadratic space were known.
The tradeoff shows for the first time that we can simultaneously achieve
subexponential time and subquadratic space.
The boundary values are the exponential time with hardly any extra space
required by the Lange-McKenzie-Tapp method and the ()th power time with
square space required by the Bennett method. We also give the first general
lower bound on the extra storage space required by general reversible
simulation. This lower bound is optimal in that it is achieved by some
reversible simulations.Comment: 11 pages LaTeX, Proc ICALP 2001, Lecture Notes in Computer Science,
Vol xxx Springer-Verlag, Berlin, 200
- …
