Computational Perspectives on Bell Inequalities and Many-Body Quantum Correlations

Total Page:16

File Type:pdf, Size:1020Kb

Computational Perspectives on Bell Inequalities and Many-Body Quantum Correlations Computational Perspectives on Bell Inequalities and Many-body Quantum Correlations Matthew Joseph Hoban A thesis submitted to University College London for the degree of Doctor of Philosophy Department of Physics and Astronomy arXiv:1204.5913v1 [quant-ph] 26 Apr 2012 University College London January 20, 2018 I, Matthew Joseph Hoban confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. 2 Abstract The predictions of quantum mechanics cannot be resolved with a completely classical view of the world. In particular, the statistics of space-like separated measurements on entangled quantum systems violate a Bell inequality [Bell1964]. We put forward a computational perspective on a broad class of Bell tests that study correlators, or the statistics of joint measurement outcomes. We associate particular maps, or functions to particular theories. The violation of a Bell inequality then implies the ability to perform some functions, or computations that classical, or more generally, local hidden variable (LHV) theories cannot. We derive an infinite class of Bell inequalities that establish a link to so- called \non-local games" [Cleve2004]. We then make the connection between Raussendorf and Briegel's formulation of Measurement-based Quantum Com- puting (MBQC) [Raussendorf2001], and these non-local games. Not only can we show that a quantum violation implies a computational advantage in this model, we show that adaptive measurements are required to perform all quantum com- putations. Finally, we explore post-selection of data in Bell tests from both a practical and conceptual point-of-view, with particular consideration to so-called \loopholes". Loopholes allow LHV theories to simulate quantum correlations through post- selection. We give a computational description of how loopholes can emerge in different post-selection scenarios. This motivates us to find a form of post- selection that does not lead to loopholes. Central again to this discussion is the description of LHV theories in terms of computations. Interestingly, quantum correlators can be made more \non-classical" with this loophole-free post-selection. This method of post-selection also can simulate information processing tasks, such as MBQC, that have time-like separated com- ponents. This opens up new avenues for the study of time-like tasks studied within the space-like separated scenario of the Bell test. 3 Publications The majority of the work in this thesis is based on the following publications: M. J. Hoban, E. T. Campbell, K. Loukopoulos, and D. E. Browne, Non-adaptive Measurement-based Quantum Computation and Multi-party Bell Inequalities, New J. Phys. 13 023014 (2011). M. J. Hoban and D. E. Browne, Stronger Quantum Correlations with Loophole- Free Postselection, Phys. Rev. Lett. 107, 120402 (2011). M. J. Hoban, J. J. Wallman, and D. E. Browne, Generalized Bell-inequality ex- periments and computation, Phys. Rev. A 84, 062107 (2011). 4 Acknowledgements I am indebted to many different people for many things throughout the process of completing my PhD. First of all, I desperately need to thank my supervisor, Dan Browne. To paraphrase Winston Churchill, \Never was so much owed by one PhD student to one tireless supervisor." I thank him for his patience, enthusiasm, insight and for sharing his great ideas. Not only has he been a great supervisor, he has been a good friend. My examiners Jon Barrett and Sougato Bose need to be thanked for their thorough reading of this thesis. Their experience and insight has only improved this document. It remains to be said that any remaining inaccuracies result from me. A lot of the work contained in this tome would never have seen the light of day if I had not had such good collaborators. Earl Campbell was instrumental in the first two years of my PhD, sharing his great insights and discussing his new ideas. I am very proud of the paper we wrote together with Klearchos Loukopoulos, whose contribution to many discussions I am also grateful for. Joel Wallman has also been a great collaborator for discussing very many ideas in our time-zone defying email discourses. I also thank Bob Coecke and Samson Abramsky for allowing me to join their group at Oxford. They have given me an independence that has allowed the continuation of some of the ideas resulting from the work contained herein. I would also like to thank the Quantum Information group at UCL for pro- ducing a delightful environment in which to do research. In particular, I am indebted to Janet Anders for showing me around on my first day and always be- ing around for good conversation, regardless of the topic. Also, my office mates at any one particular time including Sai-Yun Ye (for long discussions on short topics), Hussain Anwar, Brad Augstein, Tahir Sharaan, Hulya Yadsan-Appleby, and Peter Burns. Outside of my office, along the corridor are the Public Engagement Unit. I would like to thank them for being just brilliant friends, especially Hilary Jackson 5 and Gemma Moore. They put up with my semi-coherent ramblings for far longer than they needed to. I will, and do already miss them. Outside of my corridor, in big old London, I have to thank my friends for distracting me from everything. In particular James Millen (who became in- tegrated into my office friends), Andy Sykes (who became integrated into my corridor friends), Philippa Stanger, Andy Webster, Keira Poland and countless others. They make it easy to miss London. Outside of London, in the United Kingdom at large, I want to thank my family. My mum and dad, Christine and Chris Hoban, for everything they have done to allow me to get this far. I doubt anyone loves their parents as much I do and defy anyone to say otherwise. Along with my parents, I want to thank my brothers Kieran, Niall and Dominic for their support and love, and for testing the water before my arrival. Kieran especially needs to be thanked for the countless lunches, excellent conversation and emotional support. Finally, and most importantly, I want to thank Francesca Richards for her kind- ness, intelligence, love and humour. Cesca (and Mwg) kept me sane throughout the whole of my PhD and I cannot begin to thank her enough. 6 Contents 1 Introductions 11 1.1 Quantum Mechanics and Entanglement . 12 1.1.1 Postulates of Quantum Mechanics . 12 1.1.2 Entanglement . 16 1.2 EPR Paradox and Bell Inequalities . 19 1.2.1 Realism and \Incompleteness" of Quantum Mechanics . 19 1.2.2 CHSH Inequality . 21 1.2.3 Geometric Construction of Bell Inequalities . 23 1.2.4 Experimental implementations for testing local realism . 24 1.2.5 The GHZ Paradox . 24 1.3 Quantum Information Processing . 27 1.3.1 Quantum Cryptography . 27 1.3.2 Quantum Computing . 29 1.3.3 Measurement-based Quantum Computing . 30 1.3.4 Entanglement as a Resource . 32 1.4 Bell Inequalities and Quantum Information . 32 1.4.1 Device-independent Quantum Information . 33 1.4.2 GHZ Paradox and Measurement-based Quantum Computing 34 1.5 Chapter Summary . 35 2 Correlators and Bell Tests 37 2.1 A General Framework for Bell tests . 38 2.1.1 Convex Polytopes and Stochastic Maps . 40 2.1.2 The Non-signalling Polytope . 42 2.1.3 Local Hidden Variable Theories and Bell Inequalities . 42 2.1.4 Facet Bell Inequalities and Computational Complexity . 44 2.2 Correlators . 47 2.2.1 Correlators as Computations . 49 2.2.2 Correlators from Physical Theories . 54 7 2.3 Non-signalling Correlations . 57 2.3.1 Generalised bipartite PR boxes . 58 2.3.2 Multipartite Generalisations of the PR box . 59 2.4 Svetlichny Correlations . 62 2.4.1 Three-party Generalised Svetlichny Correlators . 63 2.4.2 Multipartite Svetlichny Correlators . 65 2.5 Chapter Summary . 67 3 Constructing Bell Inequalities and Quantum Violations 68 3.0.1 Notation . 69 3.1 Facet Bell Inequalities . 70 3.1.1 Symmetries of the LHV Polytope . 71 3.1.2 Notation for Bell inequalities . 73 3.1.3 Bipartite facet Bell inequalities . 74 3.1.4 Tripartite facet Bell inequalities . 77 3.1.5 Multipartite facet inequalities for (n; 2; 2) . 78 3.2 Quantum Violations of Bell Inequalities . 84 3.2.1 Numerical Methods for finding Violations of Bell Inequalities 85 3.2.2 Bipartite Quantum Violations and Entanglement . 88 3.2.3 Quantum Upper Bounds of (n; 2; 2) Bell Inequalities . 91 3.3 Non-trivial Bell Inequalities . 93 3.3.1 Non-trivial Inequalities as Generalisations of the CHSH In- equality . 94 3.3.2 Non-local Games . 97 3.3.3 (n; 2; 2) scenario and the n-partite NAND function . 100 3.4 Non-adaptive Measurement-based Quantum Computing . 105 3.4.1 nMBQC, NLG and non-trivial Bell inequalities . 108 3.4.2 Generalized GHZ Paradoxes and PR boxes . 113 3.5 Chapter Summary . 116 4 Data Post-selection in Bell Tests 118 4.0.1 Notation . 120 4.1 Post-selection and the Detection Loophole . 120 4.1.1 The Detection loophole . 122 4.1.2 Rederivation of the GM detection efficiency . 126 4.1.3 Generalisation of the GM bound to Many Parties . 129 4.1.4 Summary of Loopholes . 132 8 4.2 Loophole-free Post-selection and Quantum Correlators . 133 4.2.1 Post-selection, Linearity and Loopholes . 134 4.2.2 Linear Input Post-selection in (n; 2; 2) tests . 136 4.2.3 Linear Output-Input Post-selection in (n; 2; 2) tests . 137 4.2.4 Bipartite Quantum correlators under post-selection .
Recommended publications
  • Front Matter of the Book Contains a Detailed Table of Contents, Which We Encourage You to Browse
    Cambridge University Press 978-1-107-00217-3 - Quantum Computation and Quantum Information: 10th Anniversary Edition Michael A. Nielsen & Isaac L. Chuang Frontmatter More information Quantum Computation and Quantum Information 10th Anniversary Edition One of the most cited books in physics of all time, Quantum Computation and Quantum Information remains the best textbook in this exciting field of science. This 10th Anniversary Edition includes a new Introduction and Afterword from the authors setting the work in context. This comprehensive textbook describes such remarkable effects as fast quantum algorithms, quantum teleportation, quantum cryptography, and quantum error-correction. Quantum mechanics and computer science are introduced, before moving on to describe what a quantum computer is, how it can be used to solve problems faster than “classical” computers, and its real-world implementation. It concludes with an in-depth treatment of quantum information. Containing a wealth of figures and exercises, this well-known textbook is ideal for courses on the subject, and will interest beginning graduate students and researchers in physics, computer science, mathematics, and electrical engineering. MICHAEL NIELSEN was educated at the University of Queensland, and as a Fulbright Scholar at the University of New Mexico. He worked at Los Alamos National Laboratory, as the Richard Chace Tolman Fellow at Caltech, was Foundation Professor of Quantum Information Science and a Federation Fellow at the University of Queensland, and a Senior Faculty Member at the Perimeter Institute for Theoretical Physics. He left Perimeter Institute to write a book about open science and now lives in Toronto. ISAAC CHUANG is a Professor at the Massachusetts Institute of Technology, jointly appointed in Electrical Engineering & Computer Science, and in Physics.
    [Show full text]
  • The Bold Ones in the Land of Strange
    PHYSICS OF THE IMPOSSIBLE: The Bold Ones in the Land of Strange By Karol Jałochowski. Translation by Kamila Slawinska. Originally published in POLITYKA 41, 85 (2010) in Polish. A new scientific center has just opened at Singapore’s Science Drive 2: its efforts are focused on revealing nature’s uttermost secrets. The place attracts many young, talented and eccentric physicists, among them some Poles. This summer night is as hot as any other night in the equatorial Singapore (December ones included). Five men, seated at a table in one of the city’s countless bars, are about to finish another pitcher of local beer. They are Artur Ekert, a Polish-born cryptologist and a Research Fellow at Merton College at the University of Oxford (profiled in issue 27 of POLITYKA); Leong Chuan Kwek, a Singapore native; Briton Hugo Cable; Brazilian Marcelo Franca Santos; and Björn Hessmo of Sweden. While enjoying their drinks, they are also trying to find a trace of comprehensive tactics in the chaotic mess of ball-kicking they are watching on a plasma screen above: a soccer game played somewhere halfway across the world. “My father always wanted me to become a soccer player. And I have failed him so miserably,” says Hessmo. His words are met with a nod of understanding. So far, the game has provided the men with no excitement. Their faces finally light up with joy only when the score table is displayed with the results of Round One of the ongoing tournament. Zeros and ones – that’s exciting! All of them are quantum information physicists: zeroes and ones is what they do.
    [Show full text]
  • Quantum Computing a New Paradigm in Science and Technology
    Quantum computing a new paradigm in science and technology Part Ib: Quantum computing. General documentary. A stroll in an incompletely explored and known world.1 Dumitru Dragoş Cioclov 3. Quantum Computer and its Architecture It is fair to assert that the exact mechanism of quantum entanglement is, nowadays explained on the base of elusive A quantum computer is a machine conceived to use quantum conjectures, already evoked in the previous sections, but mechanics effects to perform computation and simulation this state-of- art it has not impeded to illuminate ideas and of behavior of matter, in the context of natural or man-made imaginative experiments in quantum information theory. On this interactions. The drive of the quantum computers are the line, is worth to mention the teleportation concept/effect, deeply implemented quantum algorithms. Although large scale general- purpose quantum computers do not exist in a sense of classical involved in modern cryptography, prone to transmit quantum digital electronic computers, the theory of quantum computers information, accurately, in principle, over very large distances. and associated algorithms has been studied intensely in the last Summarizing, quantum effects, like interference and three decades. entanglement, obviously involve three states, assessable by The basic logic unit in contemporary computers is a bit. It is zero, one and both indices, similarly like a numerical base the fundamental unit of information, quantified, digitally, by the two (see, e.g. West Jacob (2003). These features, at quantum, numbers 0 or 1. In this format bits are implemented in computers level prompted the basic idea underlying the hole quantum (hardware), by a physic effect generated by a macroscopic computation paradigm.
    [Show full text]
  • Status of Quantum Computer Development Entwicklungsstand Quantencomputer Document History
    Status of quantum computer development Entwicklungsstand Quantencomputer Document history Version Date Editor Description 1.0 May 2018 Document status after main phase of project 1.1 July 2019 First update containing both new material and improved readability, details summarized in chapters 1.6 and 2.11 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: [email protected] Internet: https://www.bsi.bund.de © Federal Office for Information Security 2017 Introduction Introduction This study discusses the current (Fall 2017, update early 2019) state of affairs in the physical implementation of quantum computing as well as algorithms to be run on them, focused on application in cryptanalysis. It is supposed to be an orientation to scientists with a connection to one of the fields involved—mathematicians, computer scientists. These will find the treatment of their own field slightly superficial but benefit from the discussion in the other sections. The executive summary as well as the introduction and conclusions to each chapter provide actionable information to decision makers. The text is separated into multiple parts that are related (but not identical) to previous work packages of this project. Authors Frank K. Wilhelm, Saarland University Rainer Steinwandt, Florida Atlantic University, USA Brandon Langenberg, Florida Atlantic University, USA Per J. Liebermann, Saarland University Anette Messinger, Saarland University Peter K. Schuhmacher, Saarland University Copyright The study including all its parts are copyrighted by the BSI–Federal Office for Information Security. Any use outside the limits defined by the copyright law without approval by the BSI is not permitted and punishable.
    [Show full text]
  • A Non-Technical Explanation of the Bell Inequality Eliminated by EPR Analysis Eliminated by Bell A
    Ghostly action at a distance: a non-technical explanation of the Bell inequality Mark G. Alford Physics Department, Washington University, Saint Louis, MO 63130, USA (Dated: 16 Jan 2016) We give a simple non-mathematical explanation of Bell's inequality. Using the inequality, we show how the results of Einstein-Podolsky-Rosen (EPR) experiments violate the principle of strong locality, also known as local causality. This indicates, given some reasonable-sounding assumptions, that some sort of faster-than-light influence is present in nature. We discuss the implications, emphasizing the relationship between EPR and the Principle of Relativity, the distinction between causal influences and signals, and the tension between EPR and determinism. I. INTRODUCTION II. OVERVIEW To make it clear how EPR experiments falsify the prin- The recent announcement of a \loophole-free" observa- ciple of strong locality, we now give an overview of the tion of violation of the Bell inequality [1] has brought re- logical context (Fig. 1). For pedagogical purposes it is newed attention to the Einstein-Podolsky-Rosen (EPR) natural to present the analysis of the experimental re- family of experiments in which such violation is observed. sults in two stages, which we will call the \EPR analy- The violation of the Bell inequality is often described as sis", and the \Bell analysis" although historically they falsifying the combination of \locality" and \realism". were not presented in exactly this form [4, 5]; indeed, However, we will follow the approach of other authors both stages are combined in Bell's 1976 paper [2]. including Bell [2{4] who emphasize that the EPR results We will concentrate on Bohm's variant of EPR, the violate a single principle, strong locality.
    [Show full text]
  • Theoretical Resolution of EPR Paradox
    SSRG International Journal of Applied Physics ( SSRG – IJAP ) – Volume 4 Issue 3 Sep to Dec 2017 Theoretical Resolution of EPR Paradox Tapan Kumar Ghosh Assistant Research Officer (Hydraulics), River Research Institute, Irrigation and Waterways Department West Bengal, PIN 741 246 India Abstract: such a limit that a comprehensive conclusion can be Bell’s inequality together with widely used drawn over the matter of dispute. CHSH inequality on joint expectation of spin states However two simple hypotheses can theoretically between Alice and Bob ends are taken as a decisive settle the matter in line with the experimental theorem to challenge EPR Paradox. All experiments evidences against EPR paradox – on the polarisation states of entangled particles Hypotheses 1: ‘Properties’ do not exist prior to n i.e. violate Bell’s inequality as well as CHSH inequality ‘counterfactual definiteness’ is meaningless in and Einstein’s version of reality now is considered quantum world. wrong somehow. Bell’s argument clearly shows that Hypotheses 2:‘Conservation Laws’ operate only on quantum mechanics simultaneously can not justify measured values and therefore have no difficulties both ‘locality’ and ‘counterfactual definiteness’. being non-local. ‘Locality’ means that no causal connection can be With these two hypotheses one can easily made faster than light. ‘Counterfactual definiteness’, calculate the joint expectation for the outcome at Alice sometimes called ‘realism’ refers to the assumption on and Bob ends. However this article is intended to the existence of properties of objects prior to proceed without these hypotheses and the resulting measurement. This paper shows on the contrary that contradiction with the prediction of quantum Quantum Mechanics is neither.
    [Show full text]
  • A Recent Encryption Technique for Images Using AES and Quantum Key Distribution
    International Journal of Research in Advent Technology, Vol.7, No.5S, May 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org A Recent Encryption Technique for Images Using AES and Quantum Key Distribution Jeba Nega Cheltha C Assistant Professor, Department of CSE, Jaipur Engineering College & Research Centre Jaipur, India [email protected] Abstract— Data security acts an imperative task while transferring information through internet, whereas, security is awfully vital in the contemporary world. Art of Cryptography endows with an original level of fortification that protects private facts from disclosure to harass. But still, day to day, it’s very arduous to safe the data from intruders. This paper presents regarding thetransferring encrypted images over internet using AES and Quantum Key Distribution method,where Advanced Encryption Standard (AES) algorithm is used for encryption as well as decryption of the picture. AES employs Symmetric key that means both the dispatcher and recipient use the identical key. So the key should be transmitted securely to both the dispatcher and recipient using Quantum key Distribution, whereas, using AES and Quantum Key Distribution the Data would be more secure. Keywords— Encryption, Decryption,AES, Quantum key Distribution 1. INTRODUCTION which is lesser than the size of AES . Also AES is against The most secured just as widely utilized approach to watch Brute Force attack. Hence the proposed work is much the protection and dependability of data communicate secured. depend on symmetric cryptography. Key distribution is the way toward sharing cryptographic keys between at least two 3. PROPOSED WORK gatherings to enable them to safely share data.
    [Show full text]
  • Lecture 12: Quantum Key Distribution. Secret Key. BB84, E91 and B92 Protocols. Continuous-Variable Protocols. 1. Secret Key. A
    Lecture 12: Quantum key distribution. Secret key. BB84, E91 and B92 protocols. Continuous-variable protocols. 1. Secret key. According to the Vernam theorem, any message (for instance, consisting of binary symbols, 01010101010101), can be encoded in an absolutely secret way if the one uses a secret key of the same length. A key is also a sequence, for instance, 01110001010001. The encoding is done by adding the message and the key modulo 2: 00100100000100. The one who knows the key can decode the encoded message by adding the key to the message modulo 2. The important thing is that the key should be used only once. It is exactly this way that classical cryptography works. Therefore the only task of quantum cryptography is to distribute the secret key between just two users (conventionally called Alice and Bob). This is Quantum Key Distribution (QKD). 2. BB84 protocol, proposed in 1984 by Bennett and Brassard – that’s where the name comes from. The idea is to encode every bit of the secret key into the polarization state of a single photon. Because the polarization state of a single photon cannot be measured without destroying this photon, this information will be ‘fragile’ and not available to the eavesdropper. Any eavesdropper (called Eve) will have to detect the photon, and then she will either reveal herself or will have to re-send this photon. But then she will inevitably send a photon with a wrong polarization state. This will lead to errors, and again the eavesdropper will reveal herself. The protocol then runs as follows.
    [Show full text]
  • Simulation of the Bell Inequality Violation Based on Quantum Steering Concept Mohsen Ruzbehani
    www.nature.com/scientificreports OPEN Simulation of the Bell inequality violation based on quantum steering concept Mohsen Ruzbehani Violation of Bell’s inequality in experiments shows that predictions of local realistic models disagree with those of quantum mechanics. However, despite the quantum mechanics formalism, there are debates on how does it happen in nature. In this paper by use of a model of polarizers that obeys the Malus’ law and quantum steering concept, i.e. superluminal infuence of the states of entangled pairs to each other, simulation of phenomena is presented. The given model, as it is intended to be, is extremely simple without using mathematical formalism of quantum mechanics. However, the result completely agrees with prediction of quantum mechanics. Although it may seem trivial, this model can be applied to simulate the behavior of other not easy to analytically evaluate efects, such as defciency of detectors and polarizers, diferent value of photons in each run and so on. For example, it is demonstrated, when detector efciency is 83% the S factor of CHSH inequality will be 2, which completely agrees with famous detector efciency limit calculated analytically. Also, it is shown in one-channel polarizers the polarization of absorbed photons, should change to the perpendicular of polarizer angle, at very end, to have perfect violation of the Bell inequality (2 √2 ) otherwise maximum violation will be limited to (1.5 √2). More than a half-century afer celebrated Bell inequality 1, nonlocality is almost totally accepted concept which has been proved by numerous experiments. Although there is no doubt about validity of the mathematical model proposed by Bell to examine the principle of the locality, it is comprehended that Bell’s inequality in its original form is not testable.
    [Show full text]
  • Violation of Bell Inequalities: Mapping the Conceptual Implications
    International Journal of Quantum Foundations 7 (2021) 47-78 Original Paper Violation of Bell Inequalities: Mapping the Conceptual Implications Brian Drummond Edinburgh, Scotland. E-mail: [email protected] Received: 10 April 2021 / Accepted: 14 June 2021 / Published: 30 June 2021 Abstract: This short article concentrates on the conceptual aspects of the violation of Bell inequalities, and acts as a map to the 265 cited references. The article outlines (a) relevant characteristics of quantum mechanics, such as statistical balance and entanglement, (b) the thinking that led to the derivation of the original Bell inequality, and (c) the range of claimed implications, including realism, locality and others which attract less attention. The main conclusion is that violation of Bell inequalities appears to have some implications for the nature of physical reality, but that none of these are definite. The violations constrain possible prequantum (underlying) theories, but do not rule out the possibility that such theories might reconcile at least one understanding of locality and realism to quantum mechanical predictions. Violation might reflect, at least partly, failure to acknowledge the contextuality of quantum mechanics, or that data from different probability spaces have been inappropriately combined. Many claims that there are definite implications reflect one or more of (i) imprecise non-mathematical language, (ii) assumptions inappropriate in quantum mechanics, (iii) inadequate treatment of measurement statistics and (iv) underlying philosophical assumptions. Keywords: Bell inequalities; statistical balance; entanglement; realism; locality; prequantum theories; contextuality; probability space; conceptual; philosophical International Journal of Quantum Foundations 7 (2021) 48 1. Introduction and Overview (Area Mapped and Mapping Methods) Concepts are an important part of physics [1, § 2][2][3, § 1.2][4, § 1][5, p.
    [Show full text]
  • Career Pathway Tracker 35 Years of Supporting Early Career Research Fellows Contents
    Career pathway tracker 35 years of supporting early career research fellows Contents President’s foreword 4 Introduction 6 Scientific achievements 8 Career achievements 14 Leadership 20 Commercialisation 24 Public engagement 28 Policy contribution 32 How have the fellowships supported our alumni? 36 Who have we supported? 40 Where are they now? 44 Research Fellowship to Fellow 48 Cover image: Graphene © Vertigo3d CAREER PATHWAY TRACKER 3 President’s foreword The Royal Society exists to encourage the development and use of Very strong themes emerge from the survey About this report science for the benefit of humanity. One of the main ways we do that about why alumni felt they benefited. The freedom they had to pursue the research they This report is based on the first is by investing in outstanding scientists, people who are pushing the wanted to do because of the independence Career Pathway Tracker of the alumni of University Research Fellowships boundaries of our understanding of ourselves and the world around the schemes afford is foremost in the minds of respondents. The stability of funding and and Dorothy Hodgkin Fellowships. This us and applying that understanding to improve lives. flexibility are also highly valued. study was commissioned by the Royal Society in 2017 and delivered by the Above Thirty-five years ago, the Royal Society The vast majority of alumni who responded The Royal Society has long believed in the Careers Research & Advisory Centre Venki Ramakrishnan, (CRAC), supported by the Institute for President of the introduced our University Research Fellowships to the survey – 95% of University Research importance of identifying and nurturing the Royal Society.
    [Show full text]
  • Krzysztof Bar. Automated Rewriting for Higher Categories and Applications
    Automated rewriting for higher categories and applications to quantum theory Krzysztof Bar University College University of Oxford A thesis submitted for the degree of Doctor of Philosophy Trinity 2016 Acknowledgements First and foremost I would like to express the most immense gratitude to my supervisor Dr Jamie Vicary, whose patience and dedication always went far above and beyond the call of duty. As our weekly meetings often turned into daily discussions, where he taught me about the intricacies of category theory and quantum physics, but most importantly about how to express scientific results in a rigorous, yet accessible fashion. The guidance he provided gave me the sense of security, the importance of which cannot be understated in the life of a research student. Ever since we started working together in the middle of my first year, there has never been a slightest doubt in my mind that our research will lead to a successful completion of my DPhil. At the end of it all, I hope that I kept the promise I gave him during our first meeting, and he saved more time as the result of our collaboration, than he put into teaching me. There are other distinguished academics who I had the fortune of encountering on my path. I want to thank my co-supervisors prof. Bob Coecke and prof. Samson Abramsky, who welcomed me as a member of their research group and initiated the entire research programme of categorical quantum mechanics, which has had such a profound impact on my academic life. My undergraduate college tutor prof.
    [Show full text]