|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-540-33133-9 |
003 |
DE-He213 |
005 |
20220112233349.0 |
007 |
cr nn 008mamaa |
008 |
100301s2006 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540331339
|9 978-3-540-33133-9
|
024 |
7 |
|
|a 10.1007/3-540-33133-6
|2 doi
|
050 |
|
4 |
|a QC173.96-174.52
|
072 |
|
7 |
|a PHQ
|2 bicssc
|
072 |
|
7 |
|a SCI057000
|2 bisacsh
|
072 |
|
7 |
|a PHQ
|2 thema
|
082 |
0 |
4 |
|a 530.12
|2 23
|
245 |
1 |
0 |
|a Quantum Computation and Information
|h [electronic resource] :
|b From Theory to Experiment /
|c edited by Hiroshi Imai, Masahito Hayashi.
|
250 |
|
|
|a 1st ed. 2006.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2006.
|
300 |
|
|
|a XV, 280 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Topics in Applied Physics,
|x 1437-0859 ;
|v 102
|
505 |
0 |
|
|a Quantum Computation -- Quantum Identification of Boolean Oracles -- Query Complexity of Quantum Biased Oracles -- Quantum Information -- Quantum Statistical Inference -- Quantum Cloning Machines -- Entanglement and Quantum Error Correction -- On Additivity Questions -- Quantum Security -- Quantum Computational Cryptography -- Quantum Key Distribution: Security, Feasibility and Robustness -- Why Quantum Steganography Can Be Stronger Than Classical Steganography -- Realization of Quantum Information System -- Photonic Realization of Quantum Information Systems.
|
520 |
|
|
|a Recently, the field of quantum computation and information has been developing through a fusion of results from various research fields in theoretical and practical areas. This book consists of the reviews of selected topics charterized by great progress and cover the field from theoretical areas to experimental ones. It contains fundamental areas, quantum query complexity, quantum statistical inference, quantum cloning, quantum entanglement, additivity. It treats three types of quantum security system, quantum public key cryptography, quantum key distribution, and quantum steganography. A photonic system is highlighted for the realization of quantum information processing.
|
650 |
|
0 |
|a Quantum physics.
|
650 |
|
0 |
|a Spintronics.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Mathematics-Data processing.
|
650 |
1 |
4 |
|a Quantum Physics.
|
650 |
2 |
4 |
|a Spintronics.
|
650 |
2 |
4 |
|a Technology and Engineering.
|
650 |
2 |
4 |
|a Computational Mathematics and Numerical Analysis.
|
700 |
1 |
|
|a Imai, Hiroshi.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Hayashi, Masahito.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642069697
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540822035
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540331322
|
830 |
|
0 |
|a Topics in Applied Physics,
|x 1437-0859 ;
|v 102
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/3-540-33133-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-PHA
|
912 |
|
|
|a ZDB-2-SXP
|
950 |
|
|
|a Physics and Astronomy (SpringerNature-11651)
|
950 |
|
|
|a Physics and Astronomy (R0) (SpringerNature-43715)
|