Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

New techniques for bounding stabilizer rank

View through CrossRef
In this work, we present number-theoretic and algebraic-geometric techniques for bounding the stabilizer rank of quantum states. First, we refine a number-theoretic theorem of Moulton to exhibit an explicit sequence of product states with exponential stabilizer rank but constant approximate stabilizer rank, and to provide alternate (and simplified) proofs of the best-known asymptotic lower bounds on stabilizer rank and approximate stabilizer rank, up to a log factor. Second, we find the first non-trivial examples of quantum states with multiplicative stabilizer rank under the tensor product. Third, we introduce and study the generic stabilizer rank using algebraic-geometric techniques.
Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften
Title: New techniques for bounding stabilizer rank
Description:
In this work, we present number-theoretic and algebraic-geometric techniques for bounding the stabilizer rank of quantum states.
First, we refine a number-theoretic theorem of Moulton to exhibit an explicit sequence of product states with exponential stabilizer rank but constant approximate stabilizer rank, and to provide alternate (and simplified) proofs of the best-known asymptotic lower bounds on stabilizer rank and approximate stabilizer rank, up to a log factor.
Second, we find the first non-trivial examples of quantum states with multiplicative stabilizer rank under the tensor product.
Third, we introduce and study the generic stabilizer rank using algebraic-geometric techniques.

Related Results

Review of Bounding Box Algorithm Based on 3D Point Cloud
Review of Bounding Box Algorithm Based on 3D Point Cloud
Abstract Collision detection is mainly to judge whether there is intersection between virtual models, which means there is collision. Bounding box is one of the impo...
Analysis and Design of Stabilizer Plates in Single-Plate Shear Connections
Analysis and Design of Stabilizer Plates in Single-Plate Shear Connections
Single-plate shear connections experience some magnitude of torsional moment, either due to the lateral torsional buckling phenomena or due to the effects of lap eccentricity. When...
Single-Stage Rotation-Decoupled Detector for Oriented Object
Single-Stage Rotation-Decoupled Detector for Oriented Object
Oriented object detection has received extensive attention in recent years, especially for the task of detecting targets in aerial imagery. Traditional detectors locate objects by ...
Stabilizer Selection Based on Physics and Lessons Learned
Stabilizer Selection Based on Physics and Lessons Learned
Abstract The objective of this paper is to share lessons on stabilizer selection with the industry that minimize drilling and tripping problems. Ideally the stabiliz...
PENINGKATAN CBR DAN PENURUNAN POTENSI PENGEMBANGAN PADA TANAH DENGAN STABILISASI DIFA SOIL STABILIZER
PENINGKATAN CBR DAN PENURUNAN POTENSI PENGEMBANGAN PADA TANAH DENGAN STABILISASI DIFA SOIL STABILIZER
Daya dukung tanah sangat penting diketahui sebelum pelaksanaan konstruksi yang dapat ditentukan dari nilai CBR. CBR merupakan parameter yang penting untuk mengevaluasi daya dukung ...
HUBUNGAN PENGETAHUAN IBU NIFAS DENGAN PELAKSANAAN BOUNDING ATTACHMENT PADA BAYI BARU LAHIR
HUBUNGAN PENGETAHUAN IBU NIFAS DENGAN PELAKSANAAN BOUNDING ATTACHMENT PADA BAYI BARU LAHIR
Ikatan batin diawali oleh rasa kasih sayang terhadap bayinya.Bayi-bayi yang menderita karna diabaikan, rasa jemu atau kecemasan, tidak merasa cukup aman untuk membentuk suatu ikata...
Investigation of Post-Darcy Flow in Thin Porous Media
Investigation of Post-Darcy Flow in Thin Porous Media
AbstractWe present numerical simulations of post-Darcy flow in thin porous medium: one consisting of staggered arrangements of circular cylinders and one random distribution of cyl...
MEED: A Memory-efficient Distance Bounding Protocol with Error Detection
MEED: A Memory-efficient Distance Bounding Protocol with Error Detection
Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attacks are a hot topic recently. A relay attack is a form of m...

Back to Top