{"id":1188,"date":"2006-02-12T17:51:33","date_gmt":"2006-02-13T00:51:33","guid":{"rendered":"http:\/\/dabacon.org\/pontiff\/?p=1188"},"modified":"2006-02-12T17:51:33","modified_gmt":"2006-02-13T00:51:33","slug":"cse-599d-lecture-notes-161718-and-19","status":"publish","type":"post","link":"https:\/\/dabacon.org\/pontiff\/2006\/02\/12\/cse-599d-lecture-notes-161718-and-19\/","title":{"rendered":"CSE 599d  Lecture Notes 16,17,18, and 19"},"content":{"rendered":"<p>The latest additions will probably have lots of errors (well even more than my normal notes!) as I haven&#8217;t taught from these notes yet and I always find errors when I teach.  (Plus they are on error correction!)  But this completes this set of notes for this quarter.  I&#8217;ll probably give these notes a good reading over sometime in the next month to correct all of the silly (and substantial) errors in the notes.   I think I covered just about what I thought I would cover.  We won&#8217;t get to quantum cryptography, but really to do this I&#8217;d need to spend some lectures on purification protocols and discuss some basic information theory to get at the Preskill-Shor proof of security.  Unfortunately if I&#8217;m going to do this I probably would have to do it over a two quarter quantum computing course (for such a course I would add results on quantum communication complexity, and a lot of the basics of quantum information theory&#8230;certainly there is not a lack of subject to spend two quarters on!)<br \/>\nActually the next class I really want to teach is a class on the representation theory of finite and Lie groups and quantum information science.  Maybe next year (next quarter I teach &#8220;Introduction to Digital Design&#8221;  No, not quantum digital design ;))<br \/>\nLecture Notes<br \/>\nLecture Notes 1: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes1.pdf\">Introduction and Basics of Quantum Theory<\/a><br \/>\nLecture Notes 2: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes2.pdf\">Dirac Notation and Basic Linear Algebra for Quantum Computing<\/a><br \/>\nLecture Notes 3: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes3.pdf\">One Qubit, Two Qubit<\/a><br \/>\nLecture Notes 4: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes4.pdf\">The No-Cloning Theorem, Classical Teleportation and Quantum Teleportation, Superdense Coding<\/a><br \/>\nLecture Notes 5: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes5.pdf\">The Quantum Circuit Model and Universal Quantum Computation<\/a><br \/>\nLecture Notes 6: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes6.pdf\">Reversible Classical Circuits and the Deutsch-Jozsa Algorithm<\/a><br \/>\nLecture Notes 7: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes7.pdf\">The Recursive and Nonrecursive Bernstein-Vazirani Algorithm<\/a><br \/>\nLecture Notes 8: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes8.pdf\">Simon&#8217;s Algorithm<\/a><br \/>\nLecture Notes 9: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes9.pdf\">The Quantum Fourier Transform and Jordan&#8217;s Algorithm<\/a><br \/>\nLecture Notes 10: <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes10.pdf\">Quantum Phase Estimation and Arbitrary Size Quantum Fourier Transforms<\/a><br \/>\nLecture Notes 11:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes11.pdf\">Shor&#8217;s Algorithm<\/a><br \/>\nLecture Notes 12:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes12.pdf\">Grover&#8217;s Algorithm<\/a><br \/>\nLecture Notes 13:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes13.pdf\">Mixed States and Open Quantum Systems<\/a><br \/>\nLecture Notes 14:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes14.pdf\">Quantum Entanglement and Bell&#8217;s Theorem<\/a><br \/>\nLecture Notes 15:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes15.pdf\">When Quantum Computers Fall Apart<\/a><br \/>\nLecture Notes 16:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes16.pdf\">Introduction to Quantum Error Correction<\/a><br \/>\nLecture Notes 17:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes17.pdf\">The Quantum Error Correcting Criteria<\/a><br \/>\nLecture Notes 18:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes18.pdf\">Stabilizer Quantum Error Correcting Codes<\/a><br \/>\nLecture Notes 19:  <a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/lecturenotes19.pdf\">Fault-Tolerant Quantum Computation and the Threshold Theorem<\/a><br \/>\nHomework<br \/>\n<a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/homework1.pdf\">Homework 1<\/a><br \/>\n<a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/homework2.pdf\">Homework 2<\/a><br \/>\n<a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/homework3.pdf\">Homework 3<\/a><br \/>\nHandouts<br \/>\n<a href=\"http:\/\/courses.cs.washington.edu\/courses\/cse599d\/06wi\/syllabus.pdf\">Syllabus<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest additions will probably have lots of errors (well even more than my normal notes!) as I haven&#8217;t taught from these notes yet and I always find errors when I teach. (Plus they are on error correction!) But this completes this set of notes for this quarter. I&#8217;ll probably give these notes a good &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/dabacon.org\/pontiff\/2006\/02\/12\/cse-599d-lecture-notes-161718-and-19\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;CSE 599d  Lecture Notes 16,17,18, and 19&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,63,83],"tags":[],"class_list":["post-1188","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-quantum","category-teaching"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/1188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/comments?post=1188"}],"version-history":[{"count":0,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/1188\/revisions"}],"wp:attachment":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/media?parent=1188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/categories?post=1188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/tags?post=1188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}