Switch to: References

Add citations

You must login to add citations.
  1. Communication Complexity as a Principle of Quantum Mechanics.Adán Cabello - 2006 - Foundations of Physics 36 (4):512-525.
    We introduce a two-party communication complexity problem in which the probability of success by using a particular strategy allows the parties to detect with certainty whether or not some forbidden communication has taken place. We show that theprobability of success is bounded by nature; any conceivable method which gives a probability of success outside these bounds is impossible. Moreover, any conceivable method to solve the problem which gives a probability success within these bounds is possible in nature. This example suggests (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Quantum computation and pseudotelepathic games.Jeffrey Bub - 2008 - Philosophy of Science 75 (4):458-472.
    A quantum algorithm succeeds not because the superposition principle allows ‘the computation of all values of a function at once’ via ‘quantum parallelism’, but rather because the structure of a quantum state space allows new sorts of correlations associated with entanglement, with new possibilities for information‐processing transformations between correlations, that are not possible in a classical state space. I illustrate this with an elementary example of a problem for which a quantum algorithm is more efficient than any classical algorithm. I (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Random Constructions in Bell Inequalities: A Survey.Carlos Palazuelos - 2018 - Foundations of Physics 48 (8):857-885.
    Initially motivated by their relevance in foundations of quantum mechanics and more recently by their applications in different contexts of quantum information science, violations of Bell inequalities have been extensively studied during the last years. In particular, an important effort has been made in order to quantify such Bell violations. Probabilistic techniques have been heavily used in this context with two different purposes. First, to quantify how common the phenomenon of Bell violations is; and second, to find large Bell violations (...)
    Download  
     
    Export citation  
     
    Bookmark