{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:51:56Z","timestamp":1729615916023,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ccc.2003.1214420","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T14:34:28Z","timestamp":1079966068000},"page":"194-205","source":"Crossref","is-referenced-by-count":0,"title":["On statistical query sampling and NMR quantum computing"],"prefix":"10.1109","author":[{"given":"A.","family":"Blum","sequence":"first","affiliation":[]},{"given":"K.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/509907.510001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335392"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45435-7_16"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380769"},{"key":"34","first-page":"351","article-title":"Quantum circuit complexity","author":"yao","year":"1993","journal-title":"FOCS'93"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301336"},{"key":"13","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1126\/science.275.5298.350","article-title":"Bulk spin resonance quantum computation","volume":"275","author":"gershenfeld","year":"1997","journal-title":"Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"11","article-title":"On quantum algorithms for non-commutative hidden subgroups","author":"ettinger","year":"0","journal-title":"STACS'99"},{"journal-title":"Hidden Subgroup States are Almost Orthogonal","year":"1999","author":"ettinger","key":"12"},{"key":"21","article-title":"Quantum algorithms and the Fourier transform","author":"jozsa","year":"1997","journal-title":"LAM"},{"key":"20","article-title":"On the efficiency of noise-tolerant PAC algorithms derived from statistical queries","author":"jackson","year":"2000","journal-title":"COLT 2000"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167200"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3897.001.0001","author":"kearns","year":"1994","journal-title":"An Introduction to Computational Learning Theory"},{"journal-title":"Quantum Computation and Quantum Information","year":"2000","author":"nielsen","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100269"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365701"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796298637"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195147"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796300921"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.51.1015"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103420"},{"journal-title":"A Study of Statistical Zero-Knowledge Proofs","year":"2000","author":"vadhan","key":"30"},{"key":"7","doi-asserted-by":"crossref","first-page":"1634","DOI":"10.1073\/pnas.94.5.1634","article-title":"Ensemble quantum computing by nuclear magnetic resonance spectroscopy","volume":"94","author":"cory","year":"1997","journal-title":"Proc Natl Acad Sci"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.052321"},{"key":"32","first-page":"59","article-title":"On learning correlated functions using statistical query","volume":"2225","author":"yang","year":"2001","journal-title":"LNAI"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1038\/30181"},{"key":"4","first-page":"424","article-title":"Quantum cryptanalysis of hidden linear forms","volume":"963","author":"boneh","year":"1995","journal-title":"LNCS"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1968.1972"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0099"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1985.0070"}],"event":{"name":"18th IEEE Annual Conference on Computational Complexity","acronym":"CCC-03","location":"Aarhus, Denmark"},"container-title":["18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8614\/27296\/01214420.pdf?arnumber=1214420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T18:59:56Z","timestamp":1585681196000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1214420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ccc.2003.1214420","relation":{},"subject":[]}}