305 research outputs found

    Strongly Universal Reversible Gate Sets

    Full text link
    It is well-known that the Toffoli gate and the negation gate together yield a universal gate set, in the sense that every permutation of {0,1}n\{0,1\}^n can be implemented as a composition of these gates. Since every bit operation that does not use all of the bits performs an even permutation, we need to use at least one auxiliary bit to perform every permutation, and it is known that one bit is indeed enough. Without auxiliary bits, all even permutations can be implemented. We generalize these results to non-binary logic: If AA is a finite set of odd cardinality then a finite gate set can generate all permutations of AnA^n for all nn, without any auxiliary symbols. If the cardinality of AA is even then, by the same argument as above, only even permutations of AnA^n can be implemented for large nn, and we show that indeed all even permutations can be obtained from a finite universal gate set. We also consider the conservative case, that is, those permutations of AnA^n that preserve the weight of the input word. The weight is the vector that records how many times each symbol occurs in the word. It turns out that no finite conservative gate set can, for all nn, implement all conservative even permutations of AnA^n without auxiliary bits. But we provide a finite gate set that can implement all those conservative permutations that are even within each weight class of AnA^n.Comment: Submitted to Rev Comp 201

    On-line construction of position heaps

    Get PDF
    We propose a simple linear-time on-line algorithm for constructing a position heap for a string [Ehrenfeucht et al, 2011]. Our definition of position heap differs slightly from the one proposed in [Ehrenfeucht et al, 2011] in that it considers the suffixes ordered from left to right. Our construction is based on classic suffix pointers and resembles the Ukkonen's algorithm for suffix trees [Ukkonen, 1995]. Using suffix pointers, the position heap can be extended into the augmented position heap that allows for a linear-time string matching algorithm [Ehrenfeucht et al, 2011].Comment: to appear in Journal of Discrete Algorithm

    Theory of Dicke narrowing in coherent population trapping

    Get PDF
    The Doppler effect is one of the dominant broadening mechanisms in thermal vapor spectroscopy. For two-photon transitions one would naively expect the Doppler effect to cause a residual broadening, proportional to the wave-vector difference. In coherent population trapping (CPT), which is a narrow-band phenomenon, such broadening was not observed experimentally. This has been commonly attributed to frequent velocity-changing collisions, known to narrow Doppler-broadened one-photon absorption lines (Dicke narrowing). Here we show theoretically that such a narrowing mechanism indeed exists for CPT resonances. The narrowing factor is the ratio between the atom's mean free path and the wavelength associated with the wave-vector difference of the two radiation fields. A possible experiment to verify the theory is suggested.Comment: 6 pages, 2 figures; Introduction revise

    The ideal energy of classical lattice dynamics

    Full text link
    We define, as local quantities, the least energy and momentum allowed by quantum mechanics and special relativity for physical realizations of some classical lattice dynamics. These definitions depend on local rates of finite-state change. In two example dynamics, we see that these rates evolve like classical mechanical energy and momentum.Comment: 12 pages, 4 figures, includes revised portion of arXiv:0805.335

    A Probabilistic Analysis of Kademlia Networks

    Full text link
    Kademlia is currently the most widely used searching algorithm in P2P (peer-to-peer) networks. This work studies an essential question about Kademlia from a mathematical perspective: how long does it take to locate a node in the network? To answer it, we introduce a random graph K and study how many steps are needed to locate a given vertex in K using Kademlia's algorithm, which we call the routing time. Two slightly different versions of K are studied. In the first one, vertices of K are labelled with fixed IDs. In the second one, vertices are assumed to have randomly selected IDs. In both cases, we show that the routing time is about c*log(n), where n is the number of nodes in the network and c is an explicitly described constant.Comment: ISAAC 201

    Clifford algebras and universal sets of quantum gates

    Get PDF
    In this paper is shown an application of Clifford algebras to the construction of computationally universal sets of quantum gates for nn-qubit systems. It is based on the well-known application of Lie algebras together with the especially simple commutation law for Clifford algebras, which states that all basic elements either commute or anticommute.Comment: 4 pages, REVTeX (2 col.), low-level language corrections, PR

    Simple Realization Of The Fredkin Gate Using A Series Of Two-body Operators

    Get PDF
    The Fredkin three-bit gate is universal for computational logic, and is reversible. Classically, it is impossible to do universal computation using reversible two-bit gates only. Here we construct the Fredkin gate using a combination of six two-body reversible (quantum) operators.Comment: Revtex 3.0, 7 pages, 3 figures appended at the end, please refer to the comment lines at the beginning of the manuscript for reasons of replacemen

    The quantum speed up as advanced knowledge of the solution

    Full text link
    With reference to a search in a database of size N, Grover states: "What is the reason that one would expect that a quantum mechanical scheme could accomplish the search in O(square root of N) steps? It would be insightful to have a simple two line argument for this without having to describe the details of the search algorithm". The answer provided in this work is: "because any quantum algorithm takes the time taken by a classical algorithm that knows in advance 50% of the information that specifies the solution of the problem". This empirical fact, unnoticed so far, holds for both quadratic and exponential speed ups and is theoretically justified in three steps: (i) once the physical representation is extended to the production of the problem on the part of the oracle and to the final measurement of the computer register, quantum computation is reduction on the solution of the problem under a relation representing problem-solution interdependence, (ii) the speed up is explained by a simple consideration of time symmetry, it is the gain of information about the solution due to backdating, to before running the algorithm, a time-symmetric part of the reduction on the solution; this advanced knowledge of the solution reduces the size of the solution space to be explored by the algorithm, (iii) if I is the information acquired by measuring the content of the computer register at the end of the algorithm, the quantum algorithm takes the time taken by a classical algorithm that knows in advance 50% of I, which brings us to the initial statement.Comment: 23 pages, to be published in IJT

    Time and Space Bounds for Reversible Simulation

    Get PDF
    We prove a general upper bound on the tradeoff between time and space that suffices for the reversible simulation of irreversible computation. Previously, only simulations using exponential time or quadratic space were known. The tradeoff shows for the first time that we can simultaneously achieve subexponential time and subquadratic space. The boundary values are the exponential time with hardly any extra space required by the Lange-McKenzie-Tapp method and the (log3\log 3)th power time with square space required by the Bennett method. We also give the first general lower bound on the extra storage space required by general reversible simulation. This lower bound is optimal in that it is achieved by some reversible simulations.Comment: 11 pages LaTeX, Proc ICALP 2001, Lecture Notes in Computer Science, Vol xxx Springer-Verlag, Berlin, 200
    corecore