Sciweavers

IPPS
2006
IEEE
13 years 10 months ago
Multiple sequence alignment by quantum genetic algorithm
In this paper we describe a new approach for the well known problem in bioinformatics: Multiple Sequence Alignment (MSA). MSA is fundamental task as it represents an essential pla...
L. Abdesslem, M. Soham, B. Mohamed
DATE
2006
IEEE
133views Hardware» more  DATE 2006»
13 years 11 months ago
Analysis and synthesis of quantum circuits by using quantum decision diagrams
Quantum information processing technology is in its pioneering stage and no proficient method for synthesizing quantum circuits has been introduced so far. This paper introduces a...
Afshin Abdollahi, Massoud Pedram
UC
2007
Springer
13 years 11 months ago
Taming Non-compositionality Using New Binders
We propose an extension of the traditional λ-calculus in which terms are used to control an outside computing device (quantum computer, DNA computer...). We introduce two new bind...
Frédéric Prost
UC
2007
Springer
13 years 11 months ago
Quantum Authenticated Key Distribution
Quantum key distributionalgorithmsuse a quantum communicationchannel with quantum information and a classical communication channel for binary information. The classical channel, ...
Naya Nagy, Selim G. Akl
ISMVL
2007
IEEE
90views Hardware» more  ISMVL 2007»
13 years 11 months ago
Quantum Robots for Teenagers
Extending the ideas of Quantum Braitenberg Vehicles from [14], we present here a family of Lego robots controlled by multiple-valued quantum circuits. The robots have at most 6 de...
Arushi Raghuvanshi, Yale Fan, Michal Woyke, Marek ...
FOCS
2007
IEEE
13 years 11 months ago
The Power of Quantum Systems on a Line
: We study the computational strength of quantum particles (each of finite dimensionality) arranged on a line. First, we prove that it is possible to perform universal adiabatic q...
Dorit Aharonov, Daniel Gottesman, Sandy Irani, Jul...
ICQNM
2008
IEEE
201views Chemistry» more  ICQNM 2008»
13 years 11 months ago
Loss-Tolerant Quantum Coin Flipping
Coin flipping is a cryptographic primitive in which two spatially separated players, who in principle do not trust each other, wish to establish a common random bit. If we limit ...
Guido Berlín, Gilles Brassard, Félix...
CDC
2008
IEEE
118views Control Systems» more  CDC 2008»
13 years 11 months ago
Quantum behaviors and networks
— The purpose of this paper is to discuss how Willems’ behavioral modeling might be applied to physical systems governed by the laws of quantum physics. A quantum behavior is s...
Matthew R. James, John Edward Gough
QI
2009
Springer
117views Physics» more  QI 2009»
13 years 11 months ago
Generalising Unitary Time Evolution
In this third Quantum Interaction (QI) meeting it is time to examine our failures. One of the weakest elements of QI as a field, arises in its continuing lack of models displaying...
Kirsty Kitto, Peter Bruza, Laurianne Sitbon
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...