Author of the publication

Multi-qubit non-adiabatic holonomic controlled quantum gates in decoherence-free subspaces.

, , , , , and . Quantum Inf. Process., 15 (9): 3651-3661 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Space Time Adaptive Processing through accelerating memory-bounded operations., , and . HPEC, page 1-6. IEEE, (2015)A Hierarchical Path Planning Approach Based on Reinforcement Learning for Mobile Robots., , , and . IScIDE, volume 8261 of Lecture Notes in Computer Science, page 393-400. Springer, (2013)Identifying improved TSPO PET imaging probes through biomathematics: The impact of multiple TSPO binding sites in vivo., , , , and . NeuroImage, 60 (2): 902-910 (2012)Beyond session segmentation: predicting changes in search intent with client-side user interactions., and . SIGIR, page 636-637. ACM, (2009)A Study for Correlation Identification in Human-Computer Interface Based on HSB Color Model., , and . HCI (4), volume 10904 of Lecture Notes in Computer Science, page 477-489. Springer, (2018)Metis: a smart memory allocator using historical reclamation information., , , , and . ICOOOLPS@ECOOP, page 6:1-6:9. ACM, (2015)Three-Level Schema Model in a Web Data Engine., , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 286-287. Springer, (2005)Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks., , , , , and . IEEE Access, (2019)Edge-RMP: Minimizing administrative assignments for role-based access control., , , and . Journal of Computer Security, 17 (2): 211-235 (2009)Generic Inverted Index on the GPU., , , , , , and . CoRR, (2016)