共 19 条
- [1] Aharonov D., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P20, DOI 10.1145/276698.276708
- [2] 1-way quantum finite automata: strengths, weaknesses and generalizations [J]. 39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, : 332 - 341
- [3] Ambainis A., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P376, DOI 10.1145/301250.301347
- [4] [Anonymous], 1997, COVERING CODES
- [5] [Anonymous], P 33 ANN ACM S THEOR
- [6] Bennett C. H., 1982, ADV CRYPTOLOGY, P267
- [7] Buhrman H., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P63, DOI 10.1145/276698.276713
- [8] Buhrman H., 2001, P 16 IEEE C COMP COM, P120, DOI DOI 10.1109/CCC.2001.933879
- [9] CHUANG I, 1997, COMMUNICATION
- [10] Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X