<--- Back to Details
First PageDocument Content
Theoretical computer science / Computational complexity theory / Mathematics / Emerging technologies / Quantum computing / Quantum algorithms / Quantum information science / Quantum algorithm / Algorithm / P versus NP problem / NP / PP
Date: 2018-08-28 08:59:24
Theoretical computer science
Computational complexity theory
Mathematics
Emerging technologies
Quantum computing
Quantum algorithms
Quantum information science
Quantum algorithm
Algorithm
P versus NP problem
NP
PP

Lecture 22, Tues April 11: Grover The next quantum algorithm we’ll cover is… Grover’s Algorithm which was discovered in 1995, shortly after Shor’s algorithm. Both Grover and Shor were working at Bell Labs at the

Add to Reading List

Source URL: www.scottaaronson.com

Download Document from Source Website

File Size: 411,29 KB

Share Document on Facebook

Similar Documents

Logic, Computation and Constraint Satisfaction Barnaby D. Martin University of Leicester

Logic, Computation and Constraint Satisfaction Barnaby D. Martin University of Leicester

DocID: 1ruap - View Document

CS364A: Algorithmic Game Theory Lecture #20: Mixed Nash Equilibria and PPAD-Completeness∗ Tim Roughgarden† December 4, 2013 Today we continue our study of the limitations of learning dynamics and polynomial-time

CS364A: Algorithmic Game Theory Lecture #20: Mixed Nash Equilibria and PPAD-Completeness∗ Tim Roughgarden† December 4, 2013 Today we continue our study of the limitations of learning dynamics and polynomial-time

DocID: 1rfbK - View Document

Mining Relations from Git Commit Messages — an Experience Report Rikard Andersson∗ , Morgan Ericsson†∗ , Anna Wingkvist† ∗ Chalmers | University of Gothenburg Gothenburg, Sweden

Mining Relations from Git Commit Messages — an Experience Report Rikard Andersson∗ , Morgan Ericsson†∗ , Anna Wingkvist† ∗ Chalmers | University of Gothenburg Gothenburg, Sweden

DocID: 1r8NA - View Document

ON THE RANDOM-SELF-REDUCIBILITY OF COMPLETE SETS JOAN FEIGENBAUMy AND  LANCE FORTNOWz

ON THE RANDOM-SELF-REDUCIBILITY OF COMPLETE SETS JOAN FEIGENBAUMy AND LANCE FORTNOWz

DocID: 1qYTn - View Document

Public Key Cryptography  Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

Public Key Cryptography Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

DocID: 1qJPm - View Document