The quantum adversary method is one of the most successful techniques for proving lower bounds on quantum query complexity. It gives optimal lower bounds for many problems, has ap...
Abstract. In 1982, Bennett and Brassard suggested a new way to provide privacy in long distance communications with security based on the correctness of the basic principles of qua...
In this paper we describe BR-4, a computational model of scienti c discovery in particle physics. The system incorporates operators for determining quantum values of known particle...
This paper represents the technical core of a pre-competitive consortium formed by AT&T, DEC and MIT to study the technology, architecture and applications of wide-band all-opt...
In performance analysis and design of communication netword modeling data traffic is important. With introduction of new applications, the characteristics of the data traffic chang...