Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully device independent quantum key distribution., and . Commun. ACM, 62 (4): 133 (2019)Expander flows, geometric embeddings and graph partitioning., , and . STOC, page 222-231. ACM, (2004)Computing with highly mixed states (extended abstract)., , and . STOC, page 697-704. ACM, (2000)The detectability lemma and quantum gap amplification., , , and . STOC, page 417-426. ACM, (2009)Expander flows, geometric embeddings and graph partitioning., , and . J. ACM, 56 (2): 5:1-5:37 (2009)A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games., , and . ITCS, page 321-322. ACM, (2013)Go-With-The-Winners Heuristic.. WADS, volume 1663 of Lecture Notes in Computer Science, page 217-218. Springer, (1999)Quantum Algorithms.. FCT, volume 2138 of Lecture Notes in Computer Science, page 45-46. Springer, (2001)Quantum Algorithms.. LATIN, volume 2286 of Lecture Notes in Computer Science, page 12-13. Springer, (2002)Sampling a Population with a Semi-Random Source., and . FSTTCS, volume 241 of Lecture Notes in Computer Science, page 443-452. Springer, (1986)