COMPSCI 111/111G. Quantum Computing. Term 1, Prepared using LATEX Beamer by Cristian S.Calude 1 / 26
|
|
- Imogen Webb
- 8 years ago
- Views:
Transcription
1 COMPSCI 111/111G Quantum Computing Prepared using LATEX Beamer by Cristian S.Calude Term 1, / 26
2 Classical vs. Quantum Computers Quantum computing was first introduced by Yuri Manin in 1980 and Richard Feynman in A quantum computer is a computation device that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data. Classical computer bit deterministic sequential Quantum computer qubit probabilistic parallel 2 / 26
3 The light switch game Figure 1: Example of light switch game 3 / 26
4 The light switch game Each light switch 1. has a number associated with it called bias, 2. and can be in two positions, ON = +1 and OFF = -1. Adding up all the switches bias values multiplied by their ON/OFF values gives a number. The objective of the game is to set the switches to get the lowest number. 4 / 26
5 The light switch game Switches biases are: +1, +0.2, +0.5, -0.7, -0.8, and Setting them, in order, to OFF, ON, OFF, OFF, ON, OFF, we get the number ( 1) (+1) + (+1) (+0.2) + ( 1) (+0.5) +( 1) ( 0.7) + (+1) ( 0.8) + ( 1) (+0.4) = / 26
6 The light switch game Did we get the lowest number? No, but almost. Switches OFF, OFF, OFF, ON, ON, OFF give the minimal number How did we guess it? Are we sure that -3.6 is the minimal number? Brute force approach: generate all 2 6 = 64 combinations of switches and choose the one which produces the lowest number. Find a better (smarter) algorithm to get the lowest number. 6 / 26
7 The light switch game Why do we need a better algorithm when the brute force gives us the solution? Number of light switches Number of combinations = = = >>> number of atoms in the universe 7 / 26
8 The light switch game A simple algorithm for the light switch game: Set all the switches with positive biases to OFF and all the switches with negative biases to ON and, finally, add up the result to get the lowest overall value. EASY, right? 8 / 26
9 The interacting light switch game A light switch game in which some pairs of switches have biases too. Figure 2: Example of interacting light switch 9 / 26
10 The interacting light switch game After setting switches to ON/OFF values, the new game s number is obtained by adding the sum of the switches bias values multiplied by their ON/OFF values, and the sum of pair of switches biases multiplied by the corresponding switches ON/OFF values. The goal is to set the switches to get the lowest number. 10 / 26
11 The interacting light switch game The interaction biases are: +0.2, -1, -0.3, -0.7, -0.7, +0.3, +0.8 and +0.1 (seven pairs have no interaction bias, i.e. their bias is 0). 11 / 26
12 The interacting light switch game Setting switches to OFF, OFF, OFF, ON, ON, OFF (the solution of the light switch game!) we get the number ( 1) (+1) + ( 1) (+0.2) + ( 1) (+0.5) + (+1) ( 0.7) +(+1) ( 0.8) + ( 1) (+0.4) + ( 1) ( 1) (+0.2) +( 1) ( 1) ( 0.3)+( 1) ( 1) ( 0.7)+( 1) (+1) ( 0.7) +( 1) (+1) (+0.3) + ( 1) (+1) ( 1) + (+1) ( 1) (+0.1). 12 / 26
13 The interacting light switch game Here is a simpler instance of the interacting light switch game: we have two switches with biases +1 and -0.8, respectively, and interaction bias -1. The brute force analysis shows the following: Switch 1 Switch 2 Switches sum Interaction sum Total sum ON ON ON OFF OFF ON OFF OFF The solution of the light switch game is OFF, ON, but this is not a solution for the interacting light switch game, which is OFF, OFF. 13 / 26
14 The interacting light switch game With the better algorithm not working in this case we are left with the brute force solution... Any better ideas? 14 / 26
15 A quantum approach to the interacting light switch game Quantum computers can help! The fundamental idea is to use qubits instead of bits and take advantage of the fact that a qubit can be into a superposition of states. What does superposition mean? A qubit is a two-state quantum-mechanical system. In contrast with the bit, which has to be in one state (+1) or the other (-1) of a two-state classical system, a qubit may be simultaneously in both states. Weird! Think that the qubit has not yet decided which state it wants to be in, hence, temporarily, it is in both states at the same time. 15 / 26
16 A quantum approach to the interacting light switch game Switches (with no biases) in Figure 2 can be represented in a quantum computer as in Figure 3: light switches are ON and OFF at the same time. Figure 3: Quantum representation of the interacting light switch 16 / 26
17 A quantum solution to the interacting light switch game Start with the representation in Figure 3 (only switches, no biases). All light switches are simultaneously ON and OFF, hence the solution (i.e. the correct ON/OFF settings for each switch) is represented in there, but temporarily hidden. Slowly turn on (read) all switch bias values. Simultaneously, slowly the quantum computer turns off the quantum superposition effect, so all switches slowly choose a classical state, either ON or OFF. At the end of the previous operation, each switch has chosen to be either ON or OFF (a solution is given). Quantum mechanics guarantees that the light switches settle into the right states (ON or OFF) to give the lowest overall number as required (the solution is correct). Readout the solution. 17 / 26
18 Adiabatic quantum computers The last step in the quantum solution seems like magic. How does this work? The reason is the adiabatic theorem (M. Born and V. Fock, 1928). A quantum mechanical system subjected to gradually changing external conditions an adiabatic process adapts itself such that it retains its initial character. 18 / 26
19 Adiabatic quantum computers Here is a simple (classical) example. An ideal pendulum in a vacuum with no friction is oscillating in a vertical plane. If the support is moved suddenly, the mode of oscillation of the pendulum will change. If the support is moved sufficiently slowly, the motion of the pendulum relative to the support will remain unchanged. A gradual change in external conditions allows the system to adapt, such that it retains its initial character. 19 / 26
20 Adiabatic quantum computers Q: Do adiabatic quantum computers exist? A: There are four quantum computers, all produced by the company called D-Wave Systems: one D-Wave One (2011) and five D-Wave Two (2013). Q: How does D-Wave assure that its computation is an adiabatic process? A: Among other things, by computing at a temperature below approximately C (almost 1 C colder than the coldest place in the universe, Boomerang Nebula). Q: D-Wave is a probabilistic machine, i.e. it may return wrong answers. Is this not a very bad thing? A: Not always. By returning multiple answers one can get important information about the confidence level of the quantum computer. 20 / 26
21 Adiabatic quantum computers Q: Is D-Wave a truly quantum computer, i.e. it really uses quantum effects? A: Probably yes, but the question is still open. Q: Is D-Wave capable of solving other problems except minimisations of problems where all variables take only 0-1 values? A: The problem is open. Q: Is D-Wave faster than the fastest classical computers? A: There are arguments for yes and arguments for no: it depends on how one measures the speed. No conclusive results yet. Q: Name an interesting problem solved with D-Wave. A: A Harvard University team of researchers presented results of the largest protein folding problem solved to date using D-Wave One in / 26
22 Adiabatic quantum computers Q: But then, D-Wave is a very, very limited machine, isn t it? A: No. Many problems including labelling images detecting and tracking objects in images extracting meaning from texts finding correlation in big databases improving natural language communication man-machine creating and testing scientific hypotheses... can be formulated as minimisations of pseudo-boolean functions with constraints. Q: How many qubits has D-Wave Two? A: / 26
23 Adiabatic quantum computers Q: What type of qubits does D-Wave use? A: D-Wave uses flux qubits pictured below. Flux qubit 23 / 26
24 Adiabatic quantum computers Flux qubit 24 / 26
25 Adiabatic quantum computers Q: Which companies bought D-Wave computers? A: Lockheed Martin (D-Wave One, D-Wave Two), Google and NASA (D-Wave Two), a US intelligence agency (D-Wave Two). Q: How much does a D-Wave cost? A: Not sure, probably around US$ 10, 000, 000. Q: What about D-Wave controversies? A: There are plenty as expected in a very audacious project. See for example the academic debate in the May 12, 2011 edition of Nature. Q: Are there non-adiabatic quantum computers? A: Yes, in theory they exist! For example, a quantum Turing machine is such a quantum computer. However, currently they cannot control more than a few qubits / 26
26 Adiabatic quantum computers Q: What is the size of the latest D-Wave quantum chip? A: Washington generation chips are 2,048 physical qubits. Q: Where can we find more information about D-Wave? A: Visit D-Wave. Q: Is there any research in this area done in the Computer Science Department? A: Yes, see Adiabatic Quantum Computing Challenges. 26 / 26
Berkeley CS191x: Quantum Mechanics and Quantum Computation Optional Class Project
Berkeley CS191x: Quantum Mechanics and Quantum Computation Optional Class Project This document describes the optional class project for the Fall 2013 offering of CS191x. The project will not be graded.
More informationthey can be scaled up, to thousands or tens of thousands of qubits from their current size of a dozen or so, watch out!
May/June 2008 Riding D-Wave A pioneer of quantum computing asks: Has a Canadian startup really demonstrated a prototype for a working, commercially viable quantum computer? By Seth Lloyd Computers process
More informationThe D-Wave 2X Quantum Computer Technology Overview
The D-Wave 2X Quantum Computer Technology Overview D-Wave Systems Inc. www.dwavesys.com D-Wave Systems Founded in 1999, D-Wave Systems is the world s first quantum computing company. Our mission is to
More informationCSC384 Intro to Artificial Intelligence
CSC384 Intro to Artificial Intelligence What is Artificial Intelligence? What is Intelligence? Are these Intelligent? CSC384, University of Toronto 3 What is Intelligence? Webster says: The capacity to
More informationWhat is Artificial Intelligence?
CSE 3401: Intro to Artificial Intelligence & Logic Programming Introduction Required Readings: Russell & Norvig Chapters 1 & 2. Lecture slides adapted from those of Fahiem Bacchus. 1 What is AI? What is
More informationEntanglement: The Holy Grail of High-Speed Design
by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will
More informationQUANTUM ENIGMA Summer 2014 Ted McIrvine
QUANTUM ENIGMA Summer 2014 Ted McIrvine June 17: Once Over Lightly & Newtonian Mechanics June 24: Electricity, Magnetism, Light & the Puzzles of 1900 July 1: Atomic Theory, Quantum Theory, Paradoxes and
More informationQuantum Computing. Robert Sizemore
Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical
More information"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it
1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso encisomo@in.tum.de Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
More informationSuperposition & the paradoxes of quantum mechanics
Superposition & the paradoxes of quantum mechanics phil 20229 Jeff Speaks February 5, 2008 1 Some examples of quantum weirdness........................... 1 1.1 Color and hardness..................................
More informationSIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
More informationwhat operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?
Inside the CPU how does the CPU work? what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? some short, boring programs to illustrate the
More informationKeywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer
Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction
More informationQuantum Computing in Finance. Colin P. Williams D- Wave Systems Inc.
Quantum Computing in Finance Colin P. Williams D- Wave Systems Inc. Overview Company background Quantum compudng & why it majers Product (D- Wave 2X TM ) Performance Programming ApplicaDons 2015 D- Wave
More informationMonday January 19th 2015 Title: "Transmathematics - a survey of recent results on division by zero" Facilitator: TheNumberNullity / James Anderson, UK
Monday January 19th 2015 Title: "Transmathematics - a survey of recent results on division by zero" Facilitator: TheNumberNullity / James Anderson, UK It has been my pleasure to give two presentations
More informationQuantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers
Quantum Computers And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015 1 Includes joint work with Amlan Chakrabarti, U. Calcutta If you were designing Nature, how would
More informationQuantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
More informationComputational complexity theory
Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision
More informationCell Phone based Activity Detection using Markov Logic Network
Cell Phone based Activity Detection using Markov Logic Network Somdeb Sarkhel sxs104721@utdallas.edu 1 Introduction Mobile devices are becoming increasingly sophisticated and the latest generation of smart
More informationNext Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE.
Straddling the Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. E R I C J O D O I N B S I D E S O T T A WA 2 0 1
More informationSimulated Quantum Annealer
Simulated Quantum Annealer Department of CIS - Senior Design 013-014 Danica Bassman danicab@seas.upenn.edu University of Pennsylvania Philadelphia, PA ABSTRACT Quantum computing requires qubits, which
More informationQUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS
QUANTUM COMPUTING: A REVIEW FOR THE RELATED ISSUES AND ITS FUTURE ASPECTS Shubhangi Tyagi 1, Harshita Malhotra 2, Deepali Bhatia 3, Prashant Vats 4 1,2,3,4 Dept. of CSE, HMRITM, New Delhi (India) ABSTRACT
More informationBits Superposition Quantum Parallelism
7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism
More informationQuantum is Sexy. Google - Millions of Search Hits
Quantum Computation A Glimpse Into the Future of Computing 6/16/2004 Richard Gordon richard_gordon@verizon.net Agenda Introduction Richard Gordon Quantum 101> Dr. Collin Williams JPL Dr. Colin Williams
More informationPhysics 9e/Cutnell. correlated to the. College Board AP Physics 1 Course Objectives
Physics 9e/Cutnell correlated to the College Board AP Physics 1 Course Objectives Big Idea 1: Objects and systems have properties such as mass and charge. Systems may have internal structure. Enduring
More informationResearch Statement Immanuel Trummer www.itrummer.org
Research Statement Immanuel Trummer www.itrummer.org We are collecting data at unprecedented rates. This data contains valuable insights, but we need complex analytics to extract them. My research focuses
More informationWhy is Bitcoin safe against a quantum computer?
Why is Bitcoin safe against a quantum computer? As we all know elliptic curve cryptography is vulnerable to a quantum computer. For a conventional computer difficulty of breaking 256-bit key equals 256/2=128
More information230483 - QOT - Quantum Optical Technologies
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications
More informationSolving NP-Hard Problems on an Adiabatic Quantum Computer. Dan Padilha dan.padilha@student.unsw.edu.au
UNSW AUSTRALIA SCHOOL OF MECHANICAL AND MANUFACTURING ENGINEERING Solving NP-Hard Problems on an Adiabatic Quantum Computer by Dan Padilha dan.padilha@student.unsw.edu.au Student ID: z3291677 Thesis submitted
More informationP vs NP problem in the field anthropology
Research Article P vs NP problem in the field anthropology Michael.A. Popov, Oxford, UK Email Michael282.eps@gmail.com Keywords P =?NP - complexity anthropology - M -decision - quantum -like game - game-theoretical
More informationTHE TOP10WAYS SOMESEO COMPANIES RIPYOUOF
SOMESEO COMPANIES RIPYOUOF THE TOP10WAYS PUBLISHEDBYIGNITEVIRALMEDIACOPYRIGHT2015 1. They don t do a full panda audit Most SEO firms start by simply building links to your website. The problem with that
More informationSupport Materials for Core Content for Assessment. Mathematics
Support Materials for Core Content for Assessment Version 4.1 Mathematics August 2007 Kentucky Department of Education Introduction to Depth of Knowledge (DOK) - Based on Norman Webb s Model (Karin Hess,
More informationQuantum Computing for Beginners: Building Qubits
Quantum Computing for Beginners: Building Qubits Suzanne Gildert Condensed Matter Physics Research (Quantum Devices Group) University of Birmingham 28/03/2007 Overview of this presentation What is a Qubit?
More informationIndian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved
Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved ANALYSIS Quantum computing for big data analysis Publication
More informationBevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12.
Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz Mérés, NCT, kvantumállapot 2015. március 12. Tegnap még összefonódtam, mára megmértek 2015.03.18. 2 Slides for Quantum Computing and
More informationNP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
More informationIntroduction to Big Data the four V's
Chapter 1: Introduction to Big Data the four V's This chapter is mainly based on the Big Data script by Donald Kossmann and Nesime Tatbul (ETH Zürich) Big Data Management and Analytics 15 Goal of Today
More informationShor s algorithm and secret sharing
Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful
More informationI d Rather Stay Stupid: The Advantage of Having Low Utility
I d Rather Stay Stupid: The Advantage of Having Low Utility Lior Seeman Department of Computer Science Cornell University lseeman@cs.cornell.edu Abstract Motivated by cost of computation in game theory,
More informationFind-The-Number. 1 Find-The-Number With Comps
Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)
More informationQuantum Computing and Grover s Algorithm
Quantum Computing and Grover s Algorithm Matthew Hayward January 14, 2015 1 Contents 1 Motivation for Study of Quantum Computing 3 1.1 A Killer App for Quantum Computing.............. 3 2 The Quantum Computer
More informationYaffs NAND Flash Failure Mitigation
Yaffs NAND Flash Failure Mitigation Charles Manning 2012-03-07 NAND flash is one of very few types of electronic device which are knowingly shipped with errors and are expected to generate further errors
More informationCourse Manual Automata & Complexity 2015
Course Manual Automata & Complexity 2015 Course code: Course homepage: Coordinator: Teachers lectures: Teacher exercise classes: Credits: X_401049 http://www.cs.vu.nl/~tcs/ac prof. dr. W.J. Fokkink home:
More informationGraphic Section Divider
Graphic Section Divider 1 Unlocking Growth with Business Analytics and Big Data: The Next Wave of Competitive Advantage Andrew McAfee Researcher, Writer, and Principal Research Scientist at MIT s Center
More informationWhat Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm
What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm 1 Question: What has quantum mechanics to do with factoring? Answer: Nothing! 2 Question: What
More informationBig Data. Donald Kossmann & Nesime Tatbul Systems Group ETH Zurich
Big Data Donald Kossmann & Nesime Tatbul Systems Group ETH Zurich Goal of Today What is Big Data? introduce all major buzz words What is not Big Data? get a feeling for opportunities & limitations Answering
More informationLesson Plan Warehouse Grade 7 Adding Integers
CCSSM: Grade 7 DOMAIN: The Number System Cluster: Apply and extend previous understandings of operations with fractions to add, subtract, multiply, and divide rational numbers. Standard: 7.NS.1: Apply
More informationResearcher 2015;7(5) http://www.sciencepub.net/researcher. Turing Machine for Quantum Computers. Mr. Abdur Razzaq
Turing Machine for Quantum Computers Mr. Abdur Razzaq MTB College Khalid Campus, Manthar road, Sadiq Abad, Punjab, Pakistan. mirzarazzaq@gmail.com Abstract This document gives the Exotic way to revolutionize
More informationChapter 15: Dynamic Programming
Chapter 15: Dynamic Programming Dynamic programming is a general approach to making a sequence of interrelated decisions in an optimum way. While we can describe the general characteristics, the details
More informationAn Implementation Of Multiprocessor Linux
An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than
More informationCPE 462 VHDL: Simulation and Synthesis
CPE 462 VHDL: Simulation and Synthesis Topic #09 - a) Introduction to random numbers in hardware Fortuna was the goddess of fortune and personification of luck in Roman religion. She might bring good luck
More informationWarm-Up. Today s Objective/Standards: Students will use the correct order of operations to evaluate algebraic expressions/ Gr. 6 AF 1.
Warm-Up CST/CAHSEE: Gr. 6 AF 1.4 Simplify: 8 + 8 2 + 2 A) 4 B) 8 C) 10 D) 14 Review: Gr. 7 NS 1.2 Complete the statement using ,. Explain. 2 5 5 2 How did students get the other answers? Other: Gr.
More informationThe Impact of Big Data on Classic Machine Learning Algorithms. Thomas Jensen, Senior Business Analyst @ Expedia
The Impact of Big Data on Classic Machine Learning Algorithms Thomas Jensen, Senior Business Analyst @ Expedia Who am I? Senior Business Analyst @ Expedia Working within the competitive intelligence unit
More informationIntelligent Heuristic Construction with Active Learning
Intelligent Heuristic Construction with Active Learning William F. Ogilvie, Pavlos Petoumenos, Zheng Wang, Hugh Leather E H U N I V E R S I T Y T O H F G R E D I N B U Space is BIG! Hubble Ultra-Deep Field
More informationEnhancing SQL Server Performance
Enhancing SQL Server Performance Bradley Ball, Jason Strate and Roger Wolter In the ever-evolving data world, improving database performance is a constant challenge for administrators. End user satisfaction
More information6.2.8 Neural networks for data mining
6.2.8 Neural networks for data mining Walter Kosters 1 In many application areas neural networks are known to be valuable tools. This also holds for data mining. In this chapter we discuss the use of neural
More information0.1 Phase Estimation Technique
Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design
More informationReview. Bayesianism and Reliability. Today s Class
Review Bayesianism and Reliability Models and Simulations in Philosophy April 14th, 2014 Last Class: Difference between individual and social epistemology Why simulations are particularly useful for social
More informationIf A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C?
Problem 3 If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C? Suggested Questions to ask students about Problem 3 The key to this question
More informationThe Public Policy Process W E E K 1 2 : T H E S C I E N C E O F T H E P O L I C Y P R O C E S S
The Public Policy Process W E E K 1 2 : T H E S C I E N C E O F T H E P O L I C Y P R O C E S S Why Study Public Policy Scientific Reasons To help us better understand the nature of political behavior
More informationConversion Between Analog and Digital Signals
ELET 3156 DL - Laboratory #6 Conversion Between Analog and Digital Signals There is no pre-lab work required for this experiment. However, be sure to read through the assignment completely prior to starting
More informationOn Attacking Statistical Spam Filters
On Attacking Statistical Spam Filters Gregory L. Wittel and S. Felix Wu Department of Computer Science University of California, Davis One Shields Avenue, Davis, CA 95616 USA Paper review by Deepak Chinavle
More informationHow Quantum Can a Computer Be? 1
How Quantum Can a Computer Be? 1 Elham Kashefi 2 Prisme N 29 September 2014 1 This text is a transcription of the presentation given by Elham Kashefi at the Cournot seminar, «Quantum Turing Testing» in
More informationMPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned Richard A Steenbergen nlayer Communications, Inc. 1 MPLS RSVP-TE Quick Review MPLS Traffic Engineering 101 Classically, IGPs used
More informationMeasuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
More informationChapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
More informationMPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned. Richard A Steenbergen <ras@gt-t.net>
MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned Richard A Steenbergen 1 MPLS RSVP-TE Quick Review MPLS Traffic Engineering 101 Classically, IGPs used only link cost to select a best
More informationDATA MINING IN FINANCE
DATA MINING IN FINANCE Advances in Relational and Hybrid Methods by BORIS KOVALERCHUK Central Washington University, USA and EVGENII VITYAEV Institute of Mathematics Russian Academy of Sciences, Russia
More information20-30 minutes, can be used within a longer activity
Locked-in 1 Age group successfully used with: Abilities assumed: Time: Size of group: 11 adult None 20-30 minutes, can be used within a longer activity anything from 2 to hundreds Focus What is an algorithm?
More informationFactoring by Quantum Computers
Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single
More informationFree Fall: Observing and Analyzing the Free Fall Motion of a Bouncing Ping-Pong Ball and Calculating the Free Fall Acceleration (Teacher s Guide)
Free Fall: Observing and Analyzing the Free Fall Motion of a Bouncing Ping-Pong Ball and Calculating the Free Fall Acceleration (Teacher s Guide) 2012 WARD S Science v.11/12 OVERVIEW Students will measure
More informationChapter 6: Sensitivity Analysis
Chapter 6: Sensitivity Analysis Suppose that you have just completed a linear programming solution which will have a major impact on your company, such as determining how much to increase the overall production
More informationQuantum control of individual electron and nuclear spins in diamond lattice
Quantum control of individual electron and nuclear spins in diamond lattice Mikhail Lukin Physics Department, Harvard University Collaborators: L.Childress, M.Gurudev Dutt, J.Taylor, D.Chang, L.Jiang,A.Zibrov
More informationCAPTURING AN INDUSTRY: Quantum Computers
CAPTURING AN INDUSTRY: Quantum Computers Recommendations for California to maximize its share of the emerging quantum computer industry. Prepared by Joe Weichman September 16, 2013 Created Through the
More informationRevised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)
Chapter 23 Squares Modulo p Revised Version of Chapter 23 We learned long ago how to solve linear congruences ax c (mod m) (see Chapter 8). It s now time to take the plunge and move on to quadratic equations.
More informationHow To Solve A K Path In Time (K)
What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov
More informationWaves: Recording Sound Waves and Sound Wave Interference (Teacher s Guide)
Waves: Recording Sound Waves and Sound Wave Interference (Teacher s Guide) OVERVIEW Students will measure a sound wave by placing the Ward s DataHub microphone near one tuning fork A440 (f=440hz). Then
More informationIs Big Data a Big Deal? What Big Data Does to Science
Is Big Data a Big Deal? What Big Data Does to Science Netherlands escience Center Wilco Hazeleger Wilco Hazeleger Student @ Wageningen University and Reading University Meteorology PhD @ Utrecht University,
More information1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
More informationLinear Programming Notes V Problem Transformations
Linear Programming Notes V Problem Transformations 1 Introduction Any linear programming problem can be rewritten in either of two standard forms. In the first form, the objective is to maximize, the material
More informationPerformance metrics for parallel systems
Performance metrics for parallel systems S.S. Kadam C-DAC, Pune sskadam@cdac.in C-DAC/SECG/2006 1 Purpose To determine best parallel algorithm Evaluate hardware platforms Examine the benefits from parallelism
More informationLearning outcomes. Students will be able to:
Learning structure of the lesson The big picture This lesson is designed to exemplify an argumentation approach to practical work, using a predict-observe-explain framework. Students often think that some
More informationMathematical Ideas that Shaped the World. Chaos and Fractals
Mathematical Ideas that Shaped the World Chaos and Fractals Plan for this class What is chaos? Why is the weather so hard to predict? Do lemmings really commit mass suicide? How do we measure the coastline
More informationFrequently Asked Questions for TFT Remote Controlled Monitors. First Rev 4/6/2005 SGMc Second Rev 5/7/2005 Third Rev 11/15/2005
Frequently Asked Questions for TFT Remote Controlled Monitors. First Rev 4/6/2005 SGMc Second Rev 5/7/2005 Third Rev 11/15/2005 1. What was the primary spark that started the fire under TFT to make remote
More informationOne Time Pad Encryption The unbreakable encryption method
One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been
More informationIntroduction to DISC and Hadoop
Introduction to DISC and Hadoop Alice E. Fischer April 24, 2009 Alice E. Fischer DISC... 1/20 1 2 History Hadoop provides a three-layer paradigm Alice E. Fischer DISC... 2/20 Parallel Computing Past and
More information3-9 EPR and Bell s theorem. EPR Bohm s version. S x S y S z V H 45
1 3-9 EPR and Bell s theorem EPR Bohm s version S x S y S z n P(n) n n P(0) 0 0 V H 45 P(45) D S D P(0) H V 2 ( ) Neumann EPR n P(n) EPR PP(n) n EPR ( ) 2 5 2 3 But even at this stage there is essentially
More informationMONITORING AND DIAGNOSIS OF A MULTI-STAGE MANUFACTURING PROCESS USING BAYESIAN NETWORKS
MONITORING AND DIAGNOSIS OF A MULTI-STAGE MANUFACTURING PROCESS USING BAYESIAN NETWORKS Eric Wolbrecht Bruce D Ambrosio Bob Paasch Oregon State University, Corvallis, OR Doug Kirby Hewlett Packard, Corvallis,
More informationQuantum Computing and Cryptography Their impact on cryptographic practice
Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January 2009 2009 Entrust, Inc. All rights reserved. Entrust is
More informationChapter 10: Network Flow Programming
Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,
More informationTowards a Tight Finite Key Analysis for BB84
The Uncertainty Relation for Smooth Entropies joint work with Charles Ci Wen Lim, Nicolas Gisin and Renato Renner Institute for Theoretical Physics, ETH Zurich Group of Applied Physics, University of Geneva
More informationDigital Electronics Detailed Outline
Digital Electronics Detailed Outline Unit 1: Fundamentals of Analog and Digital Electronics (32 Total Days) Lesson 1.1: Foundations and the Board Game Counter (9 days) 1. Safety is an important concept
More informationThe Nature of Science. 2012 Virginia Science Standards Institute Denny Casey, Ph.D.
The Nature of Science 2012 Virginia Science Standards Institute Denny Casey, Ph.D. Equipped with five senses, humanity explores the universe and calls the adventure Science. So, what is science? On an
More informationTechnology Update White Paper. High Speed RAID 6. Powered by Custom ASIC Parity Chips
Technology Update White Paper High Speed RAID 6 Powered by Custom ASIC Parity Chips High Speed RAID 6 Powered by Custom ASIC Parity Chips Why High Speed RAID 6? Winchester Systems has developed High Speed
More informationLearning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
More informationQuantum Systems for Information Technology
Lecture Quantum Systems for Information Technology fall term (HS) 2010 Lecturer: e Andreas Wallraff office: HPF D 8/9, ETH Hoenggerberg email: qsit-lecture@phys.ethz.ch What is this lecture about? Quantum
More informationAn Empirical Study of Two MIS Algorithms
An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. tushar.bisht@research.iiit.ac.in,
More informationOperation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
More informationNanocomputer & Architecture
Nanocomputer & Architecture Yingjie Wei Western Michigan University Department of Computer Science CS 603 - Dr. Elise dedonckor Febrary 4 th, 2004 Nanocomputer Architecture Contents Overview of Nanotechnology
More information