Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Subjects(RVK)
Access
  • 1
    UID:
    almafu_BV002653171
    Format: 208 S. : zahlr. Ill., Kt.
    ISBN: 3-907514-04-1
    Series Statement: Der Friedens-Nobelpreis von 1901 bis heute 4
    Note: Bibliogr. S. 201 - 202
    Language: German
    Subjects: General works
    RVK:
    Keywords: Friedens-Nobelpreis ; Preisträger ; Biografie
    Author information: Pross, Harry 1923-2010
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV014686623
    Format: 445 S. : Ill. : 21 cm.
    ISBN: 3-89602-505-8
    Language: German
    Subjects: Computer Science , General works
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; Erfinder ; Internet ; Firma ; Biografie ; Wörterbuch ; Biografie ; Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947363726402882
    Format: XXII, 555 p. 90 illus. , online resource.
    ISBN: 9783319089706
    Series Statement: Lecture Notes in Computer Science, 8558
    Content: This book constitutes the proceedings of the 5th International Conference on Interactive Theorem Proving, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, in Vienna, Austria, in July 2014. The 35 papers presented in this volume were carefully reviewed and selected from 59 submissions. The topics range from theoretical foundations to implementation aspects and applications in program verification, security and formalization of mathematics.
    Note: Microcode Verification – Another Piece of the Microprocessor Verification Puzzle -- Are We There Yet? 20 Years of Industrial Theorem Proving with SPARK -- Towards a Formally Verified Proof Assistant -- Implicational Rewriting Tactics in HOL -- A Heuristic Prover for Real Inequalities -- A Formal Library for Elliptic Curves in the Coq Proof Assistant -- Truly Modular (Co) data types for Isabelle/HOL -- Cardinals in Isabelle/HOL -- Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code -- Showing Invariance Compositionally for a Process Algebra for Network Protocols -- A Computer-Algebra-Based Formal Proof of the Irrationality of ζ(3) -- From Operational Models to Information Theory; Side Channels in pGCL with Isabelle -- A Coq Formalization of Finitely Presented Modules -- Formalized, Effective Domain Theory in Coq -- Completeness and Decidability Results for CTL in Coq -- Hypermap Specification and Certified Linked Implementation Using Orbits -- A Verified Generate-Test-Aggregate Coq Library for Parallel Programs Extraction -- Experience Implementing a Performant Category-Theory Library in Coq -- A New and Formalized Proof of Abstract Completion -- HOL with Definitions: Semantics, Soundness and a Verified Implementation -- Verified Efficient Implementation of Gabow’s Strongly Connected Component Algorithm -- Recursive Functions on Lazy Lists via Domains and Topologies -- Formal Verification of Optical Quantum Flip Gate -- Compositional Computational Reflection -- An Isabelle Proof Method Language -- Proof Pearl: Proving a Simple Von Neumann Machine Turing Complete -- The Reflective Milawa Theorem Prover Is Sound (Down to the Machine Code That Runs It) -- Balancing Lists: A Proof Pearl -- Unified Decision Procedures for Regular Expression Equivalence -- Collaborative Interactive Theorem Proving with Clide -- On the Formalization of Z-Transform in HOL -- Universe Polymorphism in Coq -- Asynchronous User Interaction and Tool Integration in Isabelle/PIDE -- HOL Constant Definition Done Right -- Rough Diamond: An Extension of Equivalence-Based Rewriting -- Formal C Semantics: Comp Cert and the C Standard -- Mechanical Certification of Loop Pipelining Transformations: A Preview.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319089690
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cambridge, MA :Mara Conner,
    UID:
    almafu_9961421188602883
    Format: 1 online resource (423 pages)
    ISBN: 0-443-13698-X
    Content: Many-Sorted Algebras for Deep Learning and Quantum Technology presents a precise and rigorous description of basic concepts in Quantum technologies and how they relate to Deep Learning and Quantum Theory. Current merging of Quantum Theory and Deep Learning techniques provides a need for a text that can give readers insight into the algebraic underpinnings of these disciplines. Although analytical, topological, probabilistic, as well as geometrical concepts are employed in many of these areas, algebra exhibits the principal thread. This thread is exposed using Many-Sorted Algebras (MSA). In almost every aspect of Quantum Theory as well as Deep Learning more than one sort or type of object is involved. For instance, in Quantum areas Hilbert spaces require two sorts, while in affine spaces, three sorts are needed. Both a global level and a local level of precise specification is described using MSA. At a local level operation involving neural nets may appear to be very algebraically different than those used in Quantum systems, but at a global level they may be identical. Again, MSA is well equipped to easily detail their equivalence through text as well as visual diagrams. Among the reasons for using MSA is in illustrating this sameness. Author Charles R. Giardina includes hundreds of well-designed examples in the text to illustrate the intriguing concepts in Quantum systems. Along with these examples are numerous visual displays. In particular, the Polyadic Graph shows the types or sorts of objects used in Quantum or Deep Learning. It also illustrates all the inter and intra sort operations needed in describing algebras. In brief, it provides the closure conditions. Throughout the text, all laws or equational identities needed in specifying an algebraic structure are precisely described. Includes hundreds of well-designed examples to illustrate the intriguing concepts in quantum systems Provides precise description of all laws or equational identities that are needed in specifying an algebraic structure Illustrates all the inter and intra sort operations needed in describing algebras.
    Note: Front Cover -- Many-Sorted Algebras for Deep Learning and Quantum Technology -- Copyright Page -- Dedication -- Contents -- List of figures -- Preface -- Acknowledgments -- 1 Introduction to quantum many-sorted algebras -- 1.1 Introduction to quantum many-sorted algebras -- 1.1.1 Algebraic structures -- 1.1.2 Many-sorted algebra methodology -- 1.1.3 Global field structure -- 1.1.4 Global algebraic structures in quantum and in machine learning -- 1.1.5 Specific machine learning field structure -- 1.1.6 Specific quantum field structure -- 1.1.7 Vector space as many-sorted algebra -- 1.1.8 Fundamental illustration of MSA in quantum -- 1.1.9 Time-limited signals as an inner product space -- 1.1.10 Kernel methods in real Hilbert spaces -- 1.1.11 R-Modules -- References -- 2 Basics of deep learning -- 2.1 Machine learning and data mining -- 2.2 Deep learning -- 2.3 Deep learning and relationship to quantum -- 2.4 Affine transformations for nodes within neural net -- 2.5 Global structure of neural net -- 2.6 Activation functions and cost functions for neural net -- 2.7 Classification with a single-node neural net -- 2.8 Backpropagation for neural net learning -- 2.9 Many-sorted algebra description of affine space -- 2.10 Overview of convolutional neural networks -- 2.11 Brief introduction to recurrent neural networks -- References -- 3 Basic algebras underlying quantum and NN mechanisms -- 3.1 From a vector space to an algebra -- 3.2 An algebra of time-limited signals -- 3.3 The commutant in an algebra -- 3.4 Algebra homomorphism -- 3.5 Hilbert space of wraparound digital signals -- 3.6 Many-sorted algebra description of a Banach space -- 3.7 Banach algebra as a many-sorted algebra -- 3.8 Many-sorted algebra for Banach* and C* algebra -- 3.9 Banach* algebra of wraparound digital signals -- 3.10 Complex-valued wraparound digital signals -- References. , 4 Quantum Hilbert spaces and their creation -- 4.1 Explicit Hilbert spaces underlying quantum technology -- 4.2 Complexification -- 4.3 Dual space used in quantum -- 4.4 Double dual Hilbert space -- 4.5 Outer product -- 4.6 Multilinear forms, wedge, and interior products -- 4.7 Many-sorted algebra for tensor vector spaces -- 4.8 The determinant -- 4.9 Tensor algebra -- 4.10 Many-sorted algebra for tensor product of Hilbert spaces -- 4.11 Hilbert space of rays -- 4.12 Projective space -- References -- 5 Quantum and machine learning applications involving matrices -- 5.1 Matrix operations -- 5.2 Qubits and their matrix representations -- 5.3 Complex representation for the Bloch sphere -- 5.4 Interior, exterior, and Lie derivatives -- 5.5 Spectra for matrices and Frobenius covariant matrices -- 5.6 Principal component analysis -- 5.7 Kernel principal component analysis -- 5.8 Singular value decomposition -- References -- 6 Quantum annealing and adiabatic quantum computing -- 6.1 Schrödinger's characterization of quantum -- 6.2 Quantum basics of annealing and adiabatic quantum computing -- 6.3 Delta function potential well and tunneling -- 6.4 Quantum memory and the no-cloning theorem -- 6.5 Basic structure of atoms and ions -- 6.6 Overview of qubit fabrication -- 6.7 Trapped ions -- 6.8 Super-conductance and the Josephson junction -- 6.9 Quantum dots -- 6.10 D-wave adiabatic quantum computers and computing -- 6.11 Adiabatic theorem -- Reference -- Further reading -- 7 Operators on Hilbert space -- 7.1 Linear operators, a MSA view -- 7.2 Closed operators in Hilbert spaces -- 7.3 Bounded operators -- 7.4 Pure tensors versus pure state operators -- 7.5 Trace class operators -- 7.6 Hilbert-Schmidt operators -- 7.7 Compact operators -- References -- 8 Spaces and algebras for quantum operators. , 8.1 Banach and Hilbert space rank, boundedness, and Schauder bases -- 8.2 Commutative and noncommutative Banach algebras -- 8.3 Subgroup in a Banach algebra -- 8.4 Bounded operators on a Hilbert space -- 8.5 Invertible operator algebra criteria on a Hilbert space -- 8.6 Spectrum in a Banach algebra -- 8.7 Ideals in a Banach algebra -- 8.8 Gelfand-Naimark-Segal construction -- 8.9 Generating a C* algebra -- 8.10 The Gelfand formula -- References -- 9 Von Neumann algebra -- 9.1 Operator topologies -- 9.2 Two basic von Neumann algebras -- 9.3 Commutant in a von Neumann algebra -- 9.4 The Gelfand transform -- References -- 10 Fiber bundles -- 10.1 MSA for the algebraic quotient spaces -- 10.2 The topological quotient space -- 10.3 Basic topological and manifold concepts -- 10.4 Fiber bundles from manifolds -- 10.5 Sections in a fiber bundle -- 10.6 Line and vector bundles -- 10.7 Analytic vector bundles -- 10.8 Elliptic curves over C -- 10.9 The quaternions -- 10.10 Hopf fibrations -- 10.11 Hopf fibration with bloch sphere S2, the one-qubit base -- 10.12 Hopf fibration with sphere S4, the two-qubit base -- References -- 11 Lie algebras and Lie groups -- 11.1 Algebraic structure -- 11.2 MSA view of a Lie algebra -- 11.3 Dimension of a Lie algebra -- 11.4 Ideals in a Lie algebra -- 11.5 Representations and MSA of a Lie group of a Lie algebra -- 11.6 Briefing on topological manifold properties of a Lie group -- 11.7 Formal description of matrix Lie groups -- 11.8 Mappings between Lie groups and Lie algebras -- 11.9 Complexification of Lie algebras -- References -- 12 Fundamental and universal covering groups -- 12.1 Homotopy a graphical view -- 12.2 Initial point equivalence for loops -- 12.3 MSA description of the fundamental group -- 12.4 Illustrating the fundamental group -- 12.5 Homotopic equivalence for topological spaces. , 12.6 The universal covering group -- 12.7 The Cornwell mapping -- References -- 13 Spectra for operators -- 13.1 Spectral classification for bounded operators -- 13.2 Spectra for operators on a Banach space -- 13.3 Symmetric, self-adjoint, and unbounded operators -- 13.4 Bounded operators and numerical range -- 13.5 Self-adjoint operators -- 13.6 Normal operators and nonbounded operators -- 13.7 Spectral decomposition -- 13.8 Spectra for self-adjoint, normal, and compact operators -- 13.9 Pure states and density functions -- 13.10 Spectrum and resolvent set -- 13.11 Spectrum for nonbounded operators -- 13.12 Brief descriptions of spectral measures and spectral theorems -- References -- 14 Canonical commutation relations -- 14.1 Isometries and unitary operations -- 14.2 Canonical hypergroups-a multisorted algebra view -- 14.3 Partial isometries -- 14.4 Multisorted algebra for partial isometries -- 14.5 Stone's theorem -- 14.6 Position and momentum -- 14.7 The Weyl form of the canonical commutation relations and the Heisenberg group -- 14.8 Stone-von Neumann and quantum mechanics equivalence -- 14.9 Symplectic vector space-a multisorted algebra approach -- 14.10 The Weyl canonical commutation relations C& -- lowast -- algebra -- References -- 15 Fock space -- 15.1 Particles within Fock spaces and Fock space structure -- 15.2 The bosonic occupation numbers and the ladder operators -- 15.3 The fermionic Fock space and the fermionic ladder operators -- 15.4 The Slater determinant and the complex Clifford space -- 15.5 Maya diagrams -- 15.6 Maya diagram representation of fermionic Fock space -- 15.7 Young diagrams representing quantum particles -- 15.8 Bogoliubov transform -- 15.9 Parafermionic and parabosonic spaces -- 15.10 Segal-Bargmann-Fock operations -- 15.11 Many-body systems and the Landau many-body expansion -- 15.12 Single-body operations. , 15.13 Two-body operations -- References -- 16 Underlying theory for quantum computing -- 16.1 Quantum computing and quantum circuits -- 16.2 Single-qubit quantum gates -- 16.3 Pauli rotational operators -- 16.4 Multiple-qubit input gates -- 16.5 The swapping operation -- 16.6 Universal quantum gate set -- 16.7 The Haar measure -- 16.8 Solovay-Kitaev theorem -- 16.9 Quantum Fourier transform and phase estimation -- 16.10 Uniform superposition and amplitude amplification -- 16.11 Reflections -- References -- 17 Quantum computing applications -- 17.1 Deutsch problem description -- 17.2 Oracle for Deutsch problem solution -- 17.3 Quantum solution to Deutsch problem -- 17.4 Deutsch-Jozsa problem description -- 17.5 Quantum solution for the Deutsch-Jozsa problem -- 17.6 Grover search problem -- 17.7 Solution to the Grover search problem -- 17.8 The Shor's cryptography problem from an algebraic view -- 17.9 Solution to the Shor's problem -- 17.10 Elliptic curve cryptography -- 17.11 MSA of elliptic curve over a finite field -- 17.12 Diffie-Hellman EEC key exchange -- References -- Further reading -- 18 Machine learning and data mining -- 18.1 Quantum machine learning applications -- 18.2 Learning types and data structures -- 18.3 Probably approximately correct learning and Vapnik-Chervonenkis dimension -- 18.4 Regression -- 18.5 K-nearest neighbor classification -- 18.6 K-nearest neighbor regression -- 18.7 Quantum K-means applications -- 18.8 Support vector classifiers -- 18.9 Kernel methods -- 18.10 Radial basis function kernel -- 18.11 Bound matrices -- 18.12 Convolutional neural networks and quantum convolutional neural networks -- References -- 19 Reproducing kernel and other Hilbert spaces -- 19.1 Algebraic solution to harmonic oscillator -- 19.2 Reproducing kernel Hilbert space over C and the disk algebra. , 19.3 Reproducing kernel Hilbert space over R.
    Additional Edition: ISBN 0-443-13697-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9947363927602882
    Format: XVI, 469 p. , online resource.
    ISBN: 9783540368632
    Series Statement: Lecture Notes in Computer Science, 3985
    Content: 1 The International Workshop on Recon?gurable Computing (ARC) started in 2005 in Algarve, Portugal. The major motivation was to create an event where on-going research e?orts as well as more elaborated, interesting and hi- quality work on applied recon?gurable computing could be presented and d- cussed. Over the last couple of years recon?gurable computing has become a we- known and established research area producing interesting as well as important results in both general and embedded computing systems. It is also getting more and more interest from industry which is attracted by the (design and development) ?exibility as well as the performance improvements that can be expected from this technology. As recon?gurablecomputing has blurred the gap between software and hardware, some even speak of a radical new programming paradigm opening a new realm of unseen applications and opportunities. The logo of the ARC workshop is the Nonius, a measurement instrument used in the Portuguese period of discoveries that was invented by Pedro Nunes, a Portuguesemathematician. As the logo suggests,the main motto of ARC is to help to navigate the world of recon?gurable computing. Driven by this motto, we hope ARC contributes to solid advances on recon?gurable computing.
    Note: Applications -- Implementation of Realtime and Highspeed Phase Detector on FPGA -- Case Study: Implementation of a Virtual Instrument on a Dynamically Reconfigurable Platform -- Configurable Embedded Core for Controlling Electro-Mechanical Systems -- Evaluation of a Locomotion Algorithm for Worm-Like Robots on FPGA-Embedded Processors -- Dynamic Partial Reconfigurable FIR Filter Design -- Event-Driven Simulation Engine for Spiking Neural Networks on a Chip -- Towards an Optimal Implementation of MLP in FPGA -- Power -- Energy Consumption for Transport of Control Information on a Segmented Software-Controlled Communication Architecture -- Quality Driven Dynamic Low Power Reconfiguration of Handhelds -- An Efficient Estimation Method of Dynamic Power Dissipation on VLSI Interconnects -- Image Processing -- Highly Paralellized Architecture for Image Motion Estimation -- Design Exploration of a Video Pre-processor for an FPGA Based SoC -- QUKU: A Fast Run Time Reconfigurable Platform for Image Edge Detection -- Applications of Small-Scale Reconfigurability to Graphics Processors -- An Embedded Multi-camera System for Simultaneous Localization and Mapping -- Performance/Cost Trade-Off Evaluation for the DCT Implementation on the Dynamically Reconfigurable Processor -- Trigonometric Computing Embedded in a Dynamically Reconfigurable CORDIC System-on-Chip -- Handel-C Design Enhancement for FPGA-Based DV Decoder -- Run-Time Resources Management on Coarse Grained, Packet-Switching Reconfigurable Architecture: A Case Study Through the APACHES’ Platform -- A New VLSI Architecture of Lifting-Based DWT -- Architecture Based on FPGA’s for Real-Time Image Processing -- Real Time Image Processing on a Portable Aid Device for Low Vision Patients -- General Purpose Real-Time Image Segmentation System -- Organization and Architecture -- Implementation of LPM Address Generators on FPGAs -- Self Reconfiguring EPIC Soft Core Processors -- Constant Complexity Management of 2D HW Multitasking in Run-Time Reconfigurable FPGAs -- Area/Performance Improvement of NoC Architectures -- Implementation of Inner Product Architecture for Increased Flexibility in Bitwidths of Input Array -- A Flexible Multi-port Caching Scheme for Reconfigurable Platforms -- Enhancing a Reconfigurable Instruction Set Processor with Partial Predication and Virtual Opcode Support -- A Reconfigurable Data Cache for Adaptive Processors -- The Emergence of Non-von Neumann Processors -- Scheduling Reconfiguration Activities of Run-Time Reconfigurable RTOS Using an Aperiodic Task Server -- A New Approach to Assess Defragmentation Strategies in Dynamically Reconfigurable FPGAs -- A 1,632 Gate-Count Zero-Overhead Dynamic Optically Reconfigurable Gate Array VLSI -- PISC: Polymorphic Instruction Set Computers -- Networks and Communication -- Generic Network Interfaces for Plug and Play NoC Based Architecture -- Providing QoS Guarantees in a NoC by Virtual Channel Reservation -- Efficient Floating-Point Implementation of High-Order (N)LMS Adaptive Filters in FPGA -- A Reconfigurable Architecture for MIMO Square Root Decoder -- Security -- Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking -- Updates on the Security of FPGAs Against Power Analysis Attacks -- Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems -- FPGA Implementation of a GF(2 m ) Tate Pairing Architecture -- Iterative Modular Division over GF(2 m ): Novel Algorithm and Implementations on FPGA -- Mobile Fingerprint Identification Using a Hardware Accelerated Biometric Service Provider -- UNITE: Uniform Hardware-Based Network Intrusion deTection Engine -- Tools -- Impact of Loop Unrolling on Area, Throughput and Clock Frequency in ROCCC: C to VHDL Compiler for FPGAs -- Automatic Compilation Framework for Bloom Filter Based Intrusion Detection -- A Basic Data Routing Model for a Coarse-Grain Reconfigurable Hardware -- Hardware and a Tool Chain for ADRES -- Integrating Custom Instruction Specifications into C Development Processes -- A Compiler-Oriented Architecture Description for Reconfigurable Systems -- Dynamic Instruction Merging and a Reconfigurable Array: Dataflow Execution with Software Compatibility -- High-Level Synthesis Using SPARK and Systolic Array -- Super Semi-systolic Array-Based Application-Specific PLD Architecture.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540367086
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_1816711667
    Format: 1 Online-Ressource (xxv, 216 Seiten)
    ISBN: 9781350274303 , 9781350274280 , 9781350274297
    Series Statement: Bloomsbury Gender and Education
    Content: In this collection, both individually and collectively, the authors explore the gendering of women's experiences in academia through the lens of narratives of lived experience. This is a cogent theme throughout the book, reflecting on women's experiences as intersectional - always raced, classed, gendered, nuanced and complex. Jointly, the chapters provide important insights into individual and collective contemporary women's experiences in academia from international perspectives, such as gender equity, barriers to success, and achievement. This comprehensive volume provides a reference point for all women and their colleagues working in universities and colleges across the world
    Note: Introduction: Gendered Narrative Experiences of Women in Academia, Michelle Ronksley-Pavia (Griffith University, Australia), Michelle M. Neumann (Southern Cross University, Australia), Jane Manakil (Griffith University, Australia) and Kelly Pickard-Smith (University of Manchester, UK) 1. Concepts and Perceptions of Gendered Women's Experiences in Academia, Michelle Ronksley-Pavia (Griffith University, Australia), Michelle M. Neumann (Southern Cross University, Australia), Kelly Pickard-Smith (University of Manchester, UK) and Jane Manakil (Griffith University, Australia) 2. The Caring Coven: Sensing In- And Out-Of-Placeness in Masculinist, Neoliberal Academia, Ea Hoeg Utoft (Aarhus University, Denmark) and Marianne Kongerslev (Aalborg University, Denmark) 3. Collective Feminist Resistance and Agitation From Within Australian Universities - Slaying the Dragon, Gail Crimmins (University of the Sunshine Coast, Australia), Sarah Casey (University of the Sunshine Coast, Australia), Joanna McIntyre (Swinburne University of Technology, Australia), Genine Hook (University of the Sunshine Coast, Australia) and Trevor Gates (University of the Sunshine Coast, Australia) 4. Experience of Bangladeshi Women Academics in a Neoliberal World - Return From Study Abroad, Rumana Hossain (University of Leeds, UK, and Jahangirnagar University, Bangladesh) 5. Exploring Black Women Academics' Experiences in English Universities Using Critical Race Theory, Janice Johnson (Coventry University, UK), Christina Schwabenland (University of Bedfordshire, UK) and Uvanney Maylor (University of Bedfordshire, UK) 6. Bias against Women Academics in Student Evaluations of Teaching: Tarring and Feathering in Academia, Michelle Ronksley-Pavia (Griffith University, Australia) 7. Challenges for Chinese Women Ph.D. Students in the United States of America - The New Foot-binding Cloth, Jackie (Jinfang) Liu (University of Minnesota, USA) 8. Gender Inequality in the Higher Education Workplace: Demanding a Seat at an Antiquated Table, Rebekah Bray (Eastern Washington University, USA) and Shelly Shaffer (Eastern Washington University, USA) 9. A Joint Autoethnographic Account of Two Young Women in Academia: On Overcoming Imposter Syndrome, Catherine Wilkinson (Liverpool John Moores University, UK) and Samantha Wilkinson (Manchester Metropolitan University, UK) 10. Women in Supramolecular Chemistry- Narratives of Resilience and Community Building in a Gender-Constrained Field, Jennifer Leigh (University of Kent, UK), Jennifer Hiscock (University of Kent, UK), Anna McConnell (Christian-Albrechts-Universität zu Kiel, Germany), Cally Haynes (University College London, UK), Claudia Caltagirone (Universita di Cagliari, Italy), Marion Kieffer (University of Bristol, UK), Emily Draper (University of Glasgow, UK), Anna Slater (Univeristy of Liverpool, UK), Larissa von Krbek (University of Bonn, Germany), Kristin Hitchins (Texas Tech University, USA), Davita Watkins (University of Mississippi, USA), Natalie Busschaert (Tulane University, USA), Kate Jolliffe (University of Sydney, Australia), and Michaele Hardie (University of Leeds, UK) 11. Feminist Online Communities: The Story of the Women in Academia Support Network (WIASN) - a Tale of Resistance and Online Activism, Kelly Pickard-Smith (University of Manchester, UK) , Eleonora Belfiore (Loughborough University, UK) and Amy Bonsall (University of Manchester, UK) 12. Three Female Academics Discuss Gender Issues and Sustainability: A Water Engineer, a Consumer Psychologist and a Science Educator Walk Into a Bar..., Alison Sammel (Canada), Lisa Watson (Athabasca University, Canada) and Dena McMartin (University of Lethbridge, Canada) Conclusion: Cogent Themes From Women's Gendered Experiences in Academia, Michelle Ronksley-Pavia (Griffith University, Australia), Kelly Pickard-Smith (University of Manchester, UK) Michelle M. Neumann (Southern Cross University, Australia) and Jane Manakil (Griffith University, Australia) Index. , Barrierefreier Inhalt: Compliant with Level AA of the Web Content Accessibility Guidelines. Content is displayed as HTML full text which can easily be resized or read with assistive technology, with mark-up that allows screen readers and keyboard-only users to navigate easily
    Additional Edition: ISBN 9781350274266
    Language: English
    Keywords: Akademikerin ; Wissenschaft ; Frau
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949845724302882
    Format: 1 online resource (446 pages)
    Edition: 4th ed.
    ISBN: 9783030609108
    Series Statement: Embedded Systems Series
    Note: Intro -- Preface -- Why Should You Read This Book? -- Who Should Read the Book? -- How Is This Book Different from Earlier Editions? -- Acknowledgments -- Contents -- About the Author -- Frequently Used Mathematical Symbols -- 1 Introduction -- 1.1 History of Terms -- 1.2 Opportunities -- 1.3 Challenges -- 1.4 Common Characteristics -- 1.5 Curriculum Integration of Embedded Systems, CPS, and IoT -- 1.5.1 Prerequisites -- 1.5.2 Recommended Additional Courses -- 1.6 Design Flows -- 1.7 Structure of This Book -- 1.8 Problems -- 2 Specifications and Modeling -- 2.1 Requirements -- 2.2 Models of Computation -- 2.3 Early Design Phases -- 2.3.1 Use Cases -- 2.3.2 (Message) Sequence Charts and Time/Distance Diagrams -- 2.3.3 Differential Equations -- 2.4 Communicating Finite State Machines (CFSMs) -- 2.4.1 Timed Automata -- 2.4.2 StateCharts -- Modeling of Hierarchy -- Timers -- Edge Labels and StateMate Semantics -- Evaluation and Extensions -- 2.4.3 Synchronous Languages -- Motivation -- Examples of Synchronous Languages: Esterel, Lustre, and SCADE -- 2.4.4 Message Passing: SDL as an Example -- Features of the Language -- Evaluation of SDL -- 2.5 Data Flow -- 2.5.1 Scope -- 2.5.2 Kahn Process Networks -- 2.5.3 SDF -- 2.5.4 Simulink -- 2.6 Petri Nets -- 2.6.1 Introduction -- 2.6.2 Condition/Event Nets -- 2.6.3 Place/Transition Nets -- 2.6.4 Predicate/Transition Nets -- 2.6.5 Evaluation -- 2.7 Discrete Event-Based Languages -- 2.7.1 Basic Discrete Event Simulation Cycle -- 2.7.2 Multi-Valued Logic -- One Signal Strength (Two Logic Values) -- Two Signal Strengths (Three and Four Logic Values) -- Three Signal Strengths (Seven Signal Values) -- Four Signal Strengths (Ten Signal Values) -- Five Signal Strengths -- 2.7.3 Transaction-Level Modeling (TLM) -- 2.7.4 SpecC -- 2.7.5 SystemC -- 2.7.6 VHDL -- Introduction -- Entities and Architectures -- Assignments. , VHDL Processes -- The VHDL Simulation Cycle -- IEEE 1164 -- 2.7.7 Verilog and SystemVerilog -- 2.8 von Neumann Languages -- 2.8.1 CSP -- 2.8.2 Ada -- 2.8.3 Communication Libraries -- MPI -- OpenMP -- 2.8.4 Additional Languages -- 2.9 Levels of Hardware Modeling -- 2.10 Comparison of Models of Computation -- 2.10.1 Criteria -- 2.10.2 Unified Modeling Language (UML) -- 2.10.3 Ptolemy II -- 2.11 Problems -- 3 Embedded System Hardware -- 3.1 Introduction -- 3.2 Input: Interface Between Physical and Cyber-World -- 3.2.1 Sensors -- 3.2.2 Discretization of Time: Sample-and-Hold Circuits -- 3.2.3 Fourier Approximation of Signals -- 3.2.4 Discretization of Values: Analog-to-Digital Converters -- Flash ADC -- Successive Approximation -- Pipelined Converters -- Other Converters -- Comparison of ADCs -- Quantization Noise -- 3.3 Processing Units -- 3.3.1 Application-Specific Integrated Circuits (ASICs) -- 3.3.2 Processors -- Energy Efficiency -- Code Size Efficiency -- Execution Time Efficiency Using Digital Signal Processing as an Example -- Multimedia and Short Vector Instruction Sets -- Very Long Instruction Word (VLIW) Processors -- VLIW Pipelines -- Multi-core Processors -- Graphics Processing Units (GPUs) -- Multiprocessor Systems on a Chip (MPSoCs) -- 3.3.3 Reconfigurable Logic -- 3.4 Memories -- 3.4.1 Conflicting Goals -- 3.4.2 Memory Hierarchies -- 3.4.3 Register Files -- 3.4.4 Caches -- 3.4.5 Scratchpad Memories -- 3.5 Communication -- 3.5.1 Requirements -- 3.5.2 Electrical Robustness -- 3.5.3 Guaranteeing Real-Time Behavior -- 3.5.4 Examples -- 3.6 Output: Interface Between Cyber and Physical World -- 3.6.1 Digital-to-Analog Converters -- 3.6.2 Sampling Theorem -- 3.6.3 Pulse-Width Modulation -- 3.6.4 Actuators -- 3.7 Electrical Energy -- 3.7.1 Energy Sources -- 3.7.2 Energy Storage -- 3.7.3 Energy Efficiency of Hardware Components. , The Case of Mobile Phones -- Sensor Networks -- 3.8 Secure Hardware -- 3.9 Problems -- 4 System Software -- 4.1 Embedded Operating Systems -- 4.1.1 General Requirements -- 4.1.2 Real-Time Operating Systems -- 4.1.3 Virtual Machines -- 4.2 Resource Access Protocols -- 4.2.1 Priority Inversion -- 4.2.2 Priority Inheritance -- 4.2.3 Priority Ceiling Protocol -- 4.2.4 Stack Resource Policy -- 4.3 ERIKA -- 4.4 Embedded Linux -- 4.4.1 Embedded Linux Structure and Size -- 4.4.2 Real-Time Properties -- 4.4.3 Flash Memory File Systems -- 4.4.4 Reducing RAM Usage -- 4.4.5 uClinux: Linux for MMU-Less Systems -- 4.4.6 Evaluating the Use of Linux in Embedded Systems -- 4.5 Hardware Abstraction Layer -- 4.6 Middleware -- 4.6.1 OSEK/VDX COM -- 4.6.2 CORBA -- 4.6.3 POSIX Threads (Pthreads) -- 4.6.4 UPnP and DPWS -- 4.7 Real-Time Databases -- 4.8 Problems -- 5 Evaluation and Validation -- 5.1 Introduction -- 5.1.1 Scope -- 5.1.2 Multi-Objective Optimization -- 5.1.3 Relevant Objectives -- 5.2 Performance Evaluation -- 5.2.1 Early Phases -- 5.2.2 WCET Estimation -- 5.2.3 Real-Time Calculus -- 5.3 Quality Metrics -- 5.3.1 Approximate Computing -- 5.3.2 Simple Criteria of Quality -- 5.3.3 Criteria for Data Analysis -- 5.4 Energy and Power Models -- 5.4.1 General Properties -- 5.4.2 Energy Model for Memories -- 5.4.3 Energy Model for Instructions -- 5.4.4 Energy Model for Functional Processor Units -- 5.4.5 Energy Model for Processor and Memory -- 5.4.6 Energy Model for an Application -- 5.4.7 Energy Model for Multiple Applications with Hardware Multithreading -- 5.4.8 Energy Model for an Android Mobile Phone -- 5.4.9 Worst Case Energy Consumption -- 5.5 Thermal Models -- 5.5.1 Steady-State Behavior -- 5.5.2 Transient State Behavior -- 5.6 Dependability and Risk Analysis -- 5.6.1 Aspects of Dependability -- 5.6.2 Security Analysis -- 5.6.3 Safety Analysis. , 5.6.4 Reliability Analysis -- 5.6.5 Fault Tree Analysis, Failure Mode, and Effect Analysis -- 5.7 Simulation -- 5.8 Rapid Prototyping and Emulation -- 5.9 Formal Verification -- 5.10 Problems -- 6 Application Mapping -- 6.1 Definition of Scheduling Problems -- 6.1.1 Elaboration on the Design Problem -- 6.1.2 Types of Scheduling Problems -- The α Field -- The β Field -- The γ Field -- 6.2 Scheduling for Uniprocessors -- 6.2.1 Scheduling for Independent Jobs -- Earliest Due Date (EDD) Algorithm -- Earliest Deadline First (EDF) Algorithm -- Least Laxity (LL) Algorithm -- Scheduling Without Preemption -- 6.2.2 Scheduling with Precedence Constraints -- Task Graphs -- Latest Deadline First (LDF) Algorithm -- 6.2.3 Periodic Scheduling Without Precedence Constraints -- Notation -- Rate Monotonic Scheduling -- Earliest Deadline First Scheduling -- Explicit-Deadline Tasks -- Deadline Monotonic Scheduling -- 6.2.4 Periodic Scheduling with Precedence Constraints -- 6.2.5 Sporadic Events -- 6.3 Scheduling for Independent Jobs on Identical Multiprocessors -- 6.3.1 Partitioned Scheduling -- 6.3.2 Global Dynamic-Priority Scheduling -- Proportional Fair (Pfair) Scheduling -- 6.3.3 Global Fixed-Job-Priority Scheduling -- G-EDF Scheduling -- EDZL Scheduling -- 6.3.4 Global Fixed-Task-Priority Scheduling -- Global Rate Monotonic Scheduling -- RMZL Scheduling -- Partitioned Scheduling for Explicit Deadlines -- 6.4 Dependent Jobs on Homogeneous Multiprocessors -- 6.4.1 As-Soon-as-Possible Scheduling -- 6.4.2 As-Late-as-Possible Scheduling -- 6.4.3 List Scheduling -- 6.4.4 Optimal Scheduling with Integer Linear Programming -- 6.5 Dependent Jobs on Heterogeneous Multiprocessors -- 6.5.1 Problem Description -- 6.5.2 Static Scheduling with Local Heuristics -- 6.5.3 Static Scheduling with Integer Linear Programming -- 6.5.4 Static Scheduling with Evolutionary Algorithms. , 6.5.5 Dynamic and Hybrid Scheduling -- 6.6 Problems -- 7 Optimization -- 7.1 High-Level Optimizations -- 7.1.1 Simple Loop Transformations -- 7.1.2 Loop Tiling/Blocking -- 7.1.3 Loop Splitting -- 7.1.4 Array Folding -- 7.1.5 Floating-Point to Fixed-Point Conversion -- 7.2 Task-Level Concurrency Management -- 7.3 Compilers for Embedded Systems -- 7.3.1 Introduction -- 7.3.2 Energy-Aware Compilation -- 7.3.3 Memory-Architecture Aware Compilation -- Compilation Techniques for Scratchpads -- Non-overlaying Allocation -- Overlaying Allocation -- Multiple Threads/Processes -- Supporting Different Architectures and Objectives -- 7.3.4 Reconciling Compilers and Timing Analysis -- 7.4 Power and Thermal Management -- 7.4.1 Dynamic Voltage and Frequency Scaling (DVFS) -- 7.4.2 Dynamic Power Management (DPM) -- 7.4.3 Thermal Management -- 7.5 Problems -- 8 Test -- 8.1 Scope -- 8.2 Test Procedures -- 8.2.1 Test Pattern Generation for Gate-Level Models -- 8.2.2 Self-Test Programs -- 8.3 Evaluation of Test Pattern Sets and System Robustness -- 8.3.1 Fault Coverage -- 8.3.2 Fault Simulation -- 8.3.3 Fault Injection -- 8.4 Design for Testability -- 8.4.1 Motivation -- 8.4.2 Scan Design -- 8.4.3 Signature Analysis -- 8.4.4 Pseudo-random Test Pattern Generation -- 8.5 Problems -- Correction to: Evaluation and Validation -- A Integer Linear Programming -- B Kirchhoff's Laws and Operational Amplifiers -- B.1 Kirchhoff's Laws -- B.2 Operational Amplifiers -- C Paging and Memory Management Units -- References -- Index.
    Additional Edition: Print version: Marwedel, Peter Embedded System Design Cham : Springer International Publishing AG,c2021 ISBN 9783030609092
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    UID:
    almafu_9961502502002883
    Format: 1 online resource (474 pages)
    Edition: 2nd ed.
    ISBN: 9780443159435
    Content: Quantum computers promise dramatic advantages in processing speed over currently available computer systems. Quantum computing offers great promise in a wide variety of computing and scientific research, including Quantum cryptography, machine learning, computational biology, renewable energy, computer-aided drug design, generative chemistry, and any scientific or enterprise application that requires computation speed or reach beyond the limits of current conventional computer systems. Foundations of Quantum Programming, Second Edition discusses how programming methodologies and technologies developed for current computers can be extended for quantum computers, along with new programming methodologies and technologies that can effectively exploit the unique power of quantum computing. The Second Edition includes two new chapters describing programming models and methodologies for parallel and distributed quantum computers. The author has also included two new chapters to introduce Quantum Machine Learning and its programming models - parameterized and differential quantum programming. In addition, the First Edition's preliminaries chapter has been split into three chapters, with two sections for quantum Turing machines and random access stored program machines added to give the reader a more complete picture of quantum computational models. Finally, several other new techniques are introduced in the Second Edition, including invariants of quantum programs and their generation algorithms, and abstract interpretation of quantum programs.
    Note: Front Cover -- Foundations of Quantum Programming -- Copyright -- Contents -- Biography -- Prof. Mingsheng Ying (1964-) -- Preface to the second edition -- Preface to the first edition -- Acknowledgements -- 1 Introduction -- 1.1 From classical programming to quantum programming - "Everything old is new again!" -- 1.1.1 Quantum programming languages and compilers -- 1.1.2 Semantics and type systems of quantum programs -- 1.1.3 Verification and analysis of quantum programs -- 1.2 Approaches to quantum programming -- 1.2.1 Classical parallel programming -- 1.2.2 Superposition-of-data versus superposition-of-programs -- 1.2.3 Classical and quantum parallelisms working together -- 1.3 Structure of the book -- Reading the book -- Teaching from the book -- I Preliminaries -- 2 Quantum mechanics -- 2.1 Hilbert spaces -- 2.2 Linear operators -- 2.2.1 Unitary transformations -- 2.3 Quantum measurements -- 2.3.1 Observables and projective measurements -- 2.3.2 Noncommutativity and uncertainty principle -- 2.4 Tensor products of Hilbert spaces -- 2.4.1 Nocloning of quantum data -- 2.5 Density operators -- 2.6 Quantum operations -- 2.7 Bibliographic remarks and further readings -- 3 Models of quantum computation -- 3.1 Quantum circuits -- 3.1.1 Basic definitions -- 3.1.2 One-qubit gates -- 3.1.3 Controlled gates -- 3.1.4 Quantum multiplexor -- 3.1.5 Universality of gates -- 3.1.6 Measurements in circuits -- 3.2 Quantum Turing machines -- 3.3 Quantum random access stored-program machines -- 3.4 Bibliographic remarks and further readings -- 4 Quantum algorithms and communication protocols -- 4.1 Quantum parallelism and interference -- 4.2 Quantum algorithms based on Hadamard transforms -- 4.2.1 Deutsch-Jozsa algorithm -- 4.2.2 Bernstein-Vazirani algorithm -- 4.2.3 Simon algorithm -- 4.3 Quantum Fourier transform -- 4.3.1 Phase estimation. , 4.4 Grover search algorithm -- 4.5 Quantum walks -- 4.5.1 Quantum-walk search algorithm -- 4.6 Basic quantum communication protocols -- 4.6.1 Quantum teleportation -- 4.6.2 Superdense coding -- 4.7 Bibliographic remarks and further readings -- II Sequential quantum programs -- 5 Quantum while-programs -- 5.1 Syntax -- 5.2 Operational semantics -- 5.3 Denotational semantics -- 5.3.1 Basic properties -- 5.3.2 Quantum domains -- 5.3.3 Semantic functions of loops -- 5.3.4 Change and access of quantum variables -- 5.3.5 Termination and divergence -- 5.3.6 Semantic functions as quantum operations -- 5.4 Illustrative example: Grover search -- 5.5 Classical recursion in quantum programming -- 5.5.1 Syntax -- 5.5.2 Operational semantics -- 5.5.3 Denotational semantics -- 5.5.4 Fixed point characterisation -- 5.6 Adding classical variables -- 5.7 Bibliographic remarks and further readings -- 6 Quantum Hoare logic -- 6.1 Quantum predicates -- 6.1.1 Quantum weakest preconditions -- 6.1.2 Commutativity of quantum predicates -- 6.2 Correctness formulas of quantum programs -- 6.3 Weakest preconditions of quantum programs -- 6.4 Proof system for partial correctness -- 6.5 Proof system for total correctness -- 6.6 An illustrative example: verification of Grover search -- 6.7 Auxiliary inference rules -- 6.8 Bibliographic remarks and further readings -- III Verification and analysis -- 7 Verification of quantum programs -- 7.1 Architecture of a quantum program verifier -- 7.1.1 Generating verification conditions -- 7.1.2 Proving verification conditions -- 7.1.3 Validity of the verifier -- 7.2 Localisation of correctness reasoning -- 7.3 Birkhoff-von Neumann quantum logic -- 7.3.1 Orthomodular lattice of closed subspaces -- 7.3.2 Propositional quantum logic -- 7.3.3 First-order quantum logic -- 7.3.4 Effect algebra and unsharp quantum logic. , 7.4 Quantum logic with quantum variables -- 7.4.1 Syntax -- 7.4.2 Semantics -- 7.4.3 Proof system -- 7.5 Quantum logic as an assertion logic -- 7.5.1 Reformulating syntax and semantics of quantum programs -- 7.5.2 Quantum Hoare logic combined with quantum logic -- 7.5.3 Adaptation rules for quantum programs -- 7.6 An effect calculus as assertion logic -- 7.6.1 A calculus of quantum effects -- 7.6.2 Quantum Hoare logic combined with effect calculus -- 7.7 Discussion -- 7.8 Bibliographic remarks and further readings -- 8 Analysis of quantum programs -- 8.1 Control flows of quantum programs -- 8.1.1 Superoperator-valued transition systems -- 8.1.2 Quantum programs as transition systems -- 8.2 Invariants and their generation -- 8.2.1 Basic definitions -- 8.2.2 Partial correctness -- 8.2.3 Inductive assertion maps -- 8.2.4 Generation of inductive invariants -- 8.2.5 An illustrative example -- 8.3 Termination analysis - ranking functions -- 8.3.1 Termination problems -- 8.3.2 Ranking functions and termination theorems -- 8.3.3 Realisability and synthesis of ranking functions -- 8.4 Termination analysis - reachability -- 8.4.1 Termination of quantum while-loops -- 8.4.2 Quantum graph theory -- 8.4.3 Decomposition of the state Hilbert space -- 8.4.4 Reachability analysis of quantum Markov chains -- 8.5 Quantum abstract interpretation -- 8.5.1 Basics of abstract interpretation -- 8.5.2 Restriction and extension of projections -- 8.5.3 Abstraction of quantum states -- 8.5.4 Abstraction of quantum operations -- 8.6 Bibliographic remarks and further readings -- IV Parallel and distributed quantum programs -- 9 Parallel quantum programs -- 9.1 Syntax of disjoint parallel quantum programs -- 9.2 Semantics of disjoint parallel quantum programs -- 9.2.1 Operational semantics -- 9.2.2 Denotational semantics -- 9.3 Proof system for disjoint parallel quantum programs. , 9.3.1 Sequentialisation rule -- 9.3.2 Tensor product of quantum predicates -- 9.3.3 Separable quantum predicates -- 9.3.4 Entangled quantum predicates -- 9.3.5 Auxiliary variables -- 9.3.6 Transferring separable predicates to entangled -- 9.3.7 Completeness of the auxiliary variables method -- 9.3.8 Completeness of the entanglement transformation method -- 9.4 Syntax of parallel quantum programs with shared variables -- 9.5 Semantics of parallel quantum programs with shared variables -- 9.6 Reasoning about parallel quantum programs with shared variables -- 9.6.1 A rule for component quantum programs -- 9.6.2 Proof outlines -- 9.6.3 Interference freedom -- 9.6.4 A rule for parallel composition of quantum programs with shared variables -- 9.7 Discussions -- 9.8 Bibliographic remarks and further readings -- 10 Distributed quantum programs -- 10.1 Quantum process algebra qCCS -- 10.1.1 Syntax -- 10.1.2 Operational semantics -- 10.1.3 Examples -- 10.1.4 Properties of transitions -- 10.2 Bisimulations between quantum processes -- 10.2.1 Basic definitions -- 10.2.2 Algebraic laws -- 10.2.3 Congruence -- 10.2.4 Recursion -- 10.2.5 Strong reduction-bisimilarity -- 10.2.6 Weak bisimulations -- 10.3 Approximate bisimulations between quantum processes -- 10.4 Adding classical variables -- 10.4.1 Syntax -- 10.4.2 Operational semantics -- 10.4.3 Examples -- 10.4.4 Bisimulations -- 10.5 Bibliographic remarks and further readings -- V Quantum control flows -- 11 Quantum case statements -- 11.1 Case statements: from classical to quantum -- 11.2 QuGCL: a language with quantum case statements -- 11.3 Guarded compositions of quantum operations -- 11.3.1 Guarded composition of unitary operators -- 11.3.2 Operator-valued functions -- 11.3.3 Guarded composition of operator-valued functions -- 11.3.4 Guarded composition of quantum operations. , 11.4 Semantics of QuGCL programs -- 11.4.1 Classical states -- 11.4.2 Semi-classical semantics -- 11.4.3 Purely quantum semantics -- 11.4.4 Weakest precondition semantics -- 11.4.5 An example -- 11.5 Quantum choice -- 11.5.1 Choices: from classical to quantum via probabilistic -- 11.5.2 Quantum implementation of probabilistic choice -- 11.6 Algebraic laws -- 11.7 A new paradigm of quantum programming - superposition-of-programs -- 11.8 Illustrative examples -- 11.8.1 Quantum walks -- 11.8.2 Quantum phase estimation -- 11.8.3 Linear combination of unitary operators -- 11.9 Discussions -- 11.9.1 Coefficients in guarded compositions -- 11.9.2 Quantum case statements guarded by subspaces -- 11.10 Bibliographic remarks and further readings -- 12 Quantum recursion -- 12.1 Syntax of quantum recursive programs -- 12.2 Motivating examples: recursive quantum walks -- 12.2.1 Specification of recursive quantum walks -- 12.2.2 How to solve recursive quantum equations? -- 12.3 Second quantisation -- 12.3.1 Multiple-particle states -- 12.3.2 Fock spaces -- 12.3.3 Observables in Fock spaces -- 12.3.4 Evolution in Fock spaces -- 12.3.5 Creation and annihilation of particles -- 12.4 Solving recursive equations in the free Fock space -- 12.4.1 A domain of operators on the free Fock space -- 12.4.2 Semantic functionals of program schemes -- 12.4.3 Fixed point semantics -- 12.4.4 Syntactic approximation -- 12.5 Recovering symmetry and antisymmetry -- 12.5.1 Symmetrisation functional -- 12.5.2 Symmetrisation of semantics of quantum recursion -- 12.6 Principal system semantics of quantum recursion -- 12.7 Illustrative examples: revisit recursive quantum walks -- 12.8 Quantum while-loops (with quantum control) -- 12.9 Bibliographic remarks and further readings -- VI Prospects -- 13 Prospects -- 13.1 Quantum machines and quantum programs. , 13.2 Implementation of quantum programming languages.
    Additional Edition: ISBN 9780443159428
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9947363096902882
    Format: XII, 546 p. , online resource.
    ISBN: 9781461559238
    Content: This volume contains the proceedings of the Third International Conference on Quantum Communication and Measurement. The series of international conferences on quantum communication and measurement was established to encourage scientists working in the interdisciplinary research fields of quantum communication science and technology. The first such conference, organized by C. Benjaballah and O. Hirota under the title "Quantum Aspects of Optical Communication," assembled approximately 80 researchers in Paris in 1990. The second conference, held in Nottingham in 1994, was organized by V. P. Belavkin, R. L. Hudson, and O. Hirota and attracted about 130 participants from 22 countries. The present conference, organized by O. Hirota, A. S. Holevo, C. M. Caves, H. P. Yuen, and L. Accardi, was heldSeptember 25-30, 1996, in Fuji-Hakone Land, Japan, andjnvolved about 120 researchers from 15 countries. The topics at this third conference included the foundations of quantum communi­ cation and information theory, quantum measurement theory, quantum cryptography and quantum computation, quantum devices and high-precision measurements, gener­ ation of nonclassical light, and atom optics. Special emphasis was placed on bringing together research workers in experimental and engineering fields of quantum commu­ nication and quantum computing and theoreticians working in quantum measurement and information theory. Nineteen plenary and parallel sessions and one poster ses­ sion were organized, at which a total of 82 papers were presented. Interesting and stimulating scientific discussions took place between and after sessions as well as in the evenings.
    Note: Speeches of Organizers -- I. Quantum Communication and Information Theory -- Information Theoretic Interpretations of von Neumann Entropy -- Quantum Information Theory, the Entropy Bound, and Mathematical Rigor in Physics -- Classical and Quantum Information Transmission and Interactions -- Bounds of the Accessible Information under the Influence of Thermal Noise -- Techniques for Bounding Quantum Correlations -- Relation between Channel Capacity and Quantum Minimax Decision in Quantum Information Theory -- Optimum Binary Signal Detections for Error Probability and Mutual Information -- Entanglement-Enhanced Classical Communication on a Noisy Quantum Channel -- Security against Eavesdropping in Quantum Cryptography -- A Linear Programming Approach to Attainable Cramér-Rao Type Bounds -- Non-Commutative Extension of Information Geometry II -- Wavelets and Information-Preserving Transformations -- On the Realization of Received Quantum State Control by Unitary Transformation -- Properties of Quantum Cryptography Based on Orthogonal States: Goldenberg and Vaidman Scheme -- Computation of Mutual Entropy in Quantum Amplifier Processes -- II. Quantum Computing -- Quantum Computing and Decoherence in Quantum Optical Systems -- Unitary Dynamics for Quantum Codewords -- Quantum Error Correction with Imperfect Gates -- Eliminating the Effects of Spontaneous Emission in Quantum Computations with Cold Trapped Ions -- Integrability and Computability in Simulating Quantum Systems -- Slowing Down the Decoherence of Quantum Bits -- Quantum Capacity of Noisy Quantum Channel -- III. Quantum Measurement Theory and Statistical Physics -- On Covariant Instruments in Quantum Measurement Theory -- Quantum State Reduction and the Quantum Bayes Principle -- On the Quantum Theory of Direct Detection -- Homodyning as Universal Detection -- Resolutions of the Identity in Terms of Line Integrals of Coherent States and Their Use for Quantum State Engineering -- Unitary Control Process for Quantum Optimum Detection -- Quantum Zeno Effect and “Domination” of the Temporal Evolution of Quantum Systems -- Physical Interpretation of Optimum Quantum Detection Operators -- Generalised Uncertainties for Quantum Signal Processing -- Optimal Quantum Measurements for Phase Estimation in Interferometry -- Hypersensitivity to Perturbation: An Information-Theoretical Characterization of Classical and Quantum Chaos -- A Topological Approach to Phase of Quantum Chaos -- Subdynamics through Time Scales and Scattering Maps in Quantum Field Theory -- Time-Ordered Wick Exponential and Quantum Stochastic Differential Equations -- “Nonlocal” Interference Effects in Frequency Domain -- Quantum Stochastic Systems in Terms of Non-Equilibrium Thermo Field Dynamics -- Considerations in the Time-Energy Uncertainty Relation from the Viewpoint of Hypothesis Testing -- An Open System Approach to Quantum Computers -- IV. Quantum Optics -- Atom Lasers -- Measurement of Quantum Phase Distribution by Projection Synthesis -- Quantum Optical Phase -- Single-Shot Adaptive Measurements of the Phase of a Single Mode Field -- Amplitude Squeezing of the Fundamental Field by Means of Traveling-Wave Quasi-Phasematched Second-Harmonic Generation in a LiNbO3 Waveguide -- Quantum Noise Reduction of the Pump Field in an Optical Parametric Oscillator -- Optical Measurements of Weak Absorption beyond Shot-Noise Limit -- Decoherence and Relaxation of Two Strongly Coupled Spin 1/2 Atoms -- Spatial Correlation Effects in Multi—Transverse Mode Lasers -- Generation of Nonclassical Photons in a Josephson-Junction Cavity -- Polarization-Squeezed Light Generation in a Second Order Nonlinear Medium -- Reconstruction of External Forces in Quantum Noises of Parametric Measuring System with Dissipation -- Squeezed State Generation in the Process of Light Interaction with a System of Free Electrons -- Diode Structure for Generation of Sub-Poissonian Photon Fluxes by Stark-Effect Blockade of Emissions -- Control of Quantum States in Nonstationary Cavity QED Systems -- A Simulation of Pulsed Squeezing in Short Optical Fiber Loop Mirror -- Quantum Properties of the Traveling-Wave x(2) Process: Theory, Experiments, and Applications.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9781461377160
    Language: English
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almafu_9959186231702883
    Format: 1 online resource (XVI, 505 p.)
    Edition: 1st ed. 1987.
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 3-540-48138-9
    Series Statement: Lecture Notes in Computer Science, 278
    Content: This volume contains abridged versions of most of the sectional talks and some invited lectures given at the International Conference on Fundamentals of Computation Theory held at Kazan State University, Kazan, USSR, June 22-26, 1987. The conference was the sixth in the series of FCT Conferences organized every odd year, and the first one to take place in the USSR. FCT '87 was organized by the Section of Discrete Mathematics of the Academy of Sciences in the USSR, the Moscow State University (Department of Discrete Mathematics), and the Kazan State University (Department of Theoretical Cybernetics). This volume contains selected contributions to the following fields: Mathematical Models of Computation, Synthesis and Complexity of Control Systems, Probabilistic Computations, Theory of Programming, Computer-Assisted Deduction. The volume reflects the fact that FCT '87 was organized in the USSR: A wide range of problems typical of research in Mathematical Cybernetics in the USSR is comprehensively represented.
    Note: Bibliographic Level Mode of Issuance: Monograph , Possibilities of probabilistic on-line counting machines -- Functional systems on semilattices -- Recognition of properties in k-valued logic and approximate algorithms -- Linearized disjunctive normal forms of boolean functions -- On a stable generating of random sequences by probabilistic automata -- Automata classes induced by Post classes -- Effective lower bounds for complexity of some classes of schemes -- Stable finite automata mappings and Church-Rosser systems -- The recursion theorem, approximations, and classifying index sets of recursively enumerable sets -- Duality of functions and data in algorithms description -- On direct methods of realization of normal algorithms by turing machines -- Verbal operation on automaton -- The new way of probabilistic compact testing -- Computational problems in alphabetic coding theory -- On the synthesis of "Irredundant" automata from a finite set of experiments -- On the equivalence problem of states for cellular automata -- Arsenals and lower bounds -- Chain — like model of programs communication -- Structor automata -- On A-completeness for some classes of bounded determinate functions -- Structure synthesis of parallel programs (Methodology and Tools) -- Saturating flows in networks -- On the number of DNF minimal relatively arbitrary measures of complexity -- Soliton automata -- On development of dialogue concurrent systems -- Discrete analogue of the Neumann method is not optimal -- A simplest probability model of asynchronous iterations -- Semantic foundations of programming -- Conditions for existence of nontrivial parallel decompositions of sequential machines -- On the digital system diagnostics under uncertainty -- The implicating vector problem and its applications to probabilistic and linear automata -- Some asymptotic evalutions of complexity of information searching -- On the complexity of approximate realization of continuous functions by schemes and formulas in continuous bases -- Codes, connected with a fraction linear functions group and their decoding -- On the capabilities of alternating and nondeterministic multitape automata -- Fast parallel algorithms for optimal edge-colouring of some tree-structured graphs -- On the complexity of elementary periodical functions realized by switching circuits -- Efficient algorithmic construction of designs -- On the complexity of Lie algebras -- A characterization of sequential machines by means of their behaviour fragments -- Some observations about NP complete sets -- Three-dimensional traps and barrages for cooperating automata -- Efficient implementation of structural recursion -- Minimal numberings of the vertices of trees — Approximate approach -- Dyck1-reductions of Context-free Languages -- Information flow and width of branching programs -- On some operations of partial monotone boolean function simplifying -- On complexity of computations with limited memory -- On the problem of completeness for the regular mappings -- The number and the structure of typical Sperner and k-non-separable families of subsets of a finite set -- A criterion of polynomial lower bounds of combinational complexity -- On generalized process logic -- Verification of programs with higher-order arrays -- On the complexity of analyzing experiments for checking local faults of an automaton -- Exponential lower bounds for real-time branching programs -- On the conditions of supplementicity in functional systems -- On one approximate algorithm for solving systems of linear inequalities with boolean variables -- The problem of minimal implicating vector -- Built-in self-testing of logic circuits using imperfect duplication -- Algebras with approximation and recursive data structures -- Procedural implementation of algebraic specifications of abstract data types -- On the complexity of realizing some systems of the functions of the algebra of logic by contact and generalized contact circuits -- On construction of A complete system of compression functions and on complexity of monotone realization of threshold boolean functions -- Diophantine complexity -- The power of nondeterminism in polynomial-size bounded-width branching programs -- Estimation algorithms of infinite graphs percolation threshold -- A solving of problems on technological models -- Some formal systems of the logic programming -- On the Programs with finite development -- D-Representing code problem solution -- Metric properties of random sequence -- Adaptive strategies for partially observable controlled random series -- The degrees of nondeterminism in pushdown automata -- Statistically effective algorithms for automata control -- Linear test procedures of recognition -- Evaluation of cardinalities of some families of ?-classes in $$P_{\aleph _0 }$$ -- On the temporal complexity of boolean mappings realizations in two-dimensional homogeneous automata -- On approximate solution of the problem of equivalent transformations of programs -- Randomized parallel computation -- On checking correctness of some classes of control systems -- The parallel complexity of some arithmetic and algebraic operations -- On difficulties of solving a problem of decomposition of the system of boolean equations -- The number of fuzzy monotone functions -- Bounded set theory and polynomial computability -- Index sets of factor-objects of the Post numbering -- On realization of boolean functions by schemes consisting of checked elements -- The complexity of the sequential choice mechanism -- Nondeterministic finite algorithmic procedures as the models of abstract computability -- The reducibility of random sequences by automata -- On structure complexity of normal basis of finite field -- On comparison of boolean bases -- A tradeoff between pagenumber and width of book embeddings of graphs -- On metric properties of automata and ?-approximation of automaton mappings -- Algorithmization of obtaining the converse comparison theorems based on solving a logical equation -- Synthesis of universal finite automats -- On cartesian powers of P2 -- Complexity gaps of Turing machines on infinite words -- Distributed infimum approximation -- On the number of keys in relational databases -- Complexity and depth of formulas realizing functions from closed classes -- Reliable networks from unreliable gates with almost minimal complexity -- On the standard and pseudostandard star height of regular sets -- To automation of theorem synthesis -- On efficiency of prefix word-encoding of binary messages -- Deductive program synthesis and Markov's principle -- Complexity of the problem of approximation of stochastic matrix by rational elements -- To the functional equivalence of Turing machines -- Theorem proving in intermediate and modal logics -- The analysis of concurrent logic control algorithms -- On a connection between the resolution method and the inverse method. , English
    In: Springer eBooks
    Additional Edition: ISBN 3-540-18740-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages