{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T19:50:38Z","timestamp":1777060238221,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,14]],"date-time":"2015-06-14T00:00:00Z","timestamp":1434240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-12-1-0486, W911NF-14-1-0098"],"award-info":[{"award-number":["W911NF-12-1-0486, W911NF-14-1-0098"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["0803478, 0829937, 0916400, 1111382, 1351096"],"award-info":[{"award-number":["0803478, 0829937, 0916400, 1111382, 1351096"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["QuEST"],"award-info":[{"award-number":["QuEST"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["FT130101744,CE11001013"],"award-info":[{"award-number":["FT130101744,CE11001013"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,14]]},"DOI":"10.1145\/2746539.2746608","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T15:35:56Z","timestamp":1433345756000},"page":"327-334","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Sparse Quantum Codes from Quantum Circuits"],"prefix":"10.1145","author":[{"given":"Dave","family":"Bacon","sequence":"first","affiliation":[{"name":"Google, Seattle, WA, USA"}]},{"given":"Steven T.","family":"Flammia","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Aram W.","family":"Harrow","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Jonathan","family":"Shi","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,14]]},"reference":[{"issue":"220502","key":"e_1_3_2_1_1_1","article-title":"Subsystem fault tolerance with the Bacon-Shor code","volume":"98","author":"Aliferis P.","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.63.032311"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.841163"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.012340"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.81.032301"},{"key":"e_1_3_2_1_6_1","volume-title":"Gauge Color Codes","author":"Bombin H.","year":"2013"},{"issue":"012320","key":"e_1_3_2_1_7_1","article-title":"Subsystem codes with spatially local generators","volume":"83","author":"Bravyi S.","year":"2011","journal-title":"Phys. Rev. A"},{"key":"e_1_3_2_1_8_1","volume-title":"Subsystem surface codes with three-qubit check operators. Quant. Inf. Comp., 13(11& 12):0963--0985, 07","author":"Bravyi S.","year":"2013"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591870"},{"issue":"050503","key":"e_1_3_2_1_10_1","article-title":"Tradeoffs for reliable quantum information storage in 2d systems","volume":"104","author":"Bravyi S.","year":"2010","journal-title":"Phys. Rev. Lett."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/043029"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/16\/12\/123056"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/13\/5\/053039"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620245"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.681315"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.54.1098"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.930942"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.930941"},{"issue":"022307","key":"e_1_3_2_1_19_1","article-title":"Automated searching for quantum subsystem codes","volume":"83","author":"Crosswhite G. M.","year":"2011","journal-title":"Phys. Rev. A"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.77.3260"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevB.72.024448"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.4726034"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420035377.ch12"},{"key":"e_1_3_2_1_24_1","volume-title":"Fault-tolerant quantum computation with constant overhead","author":"Gottesman D.","year":"2013"},{"key":"e_1_3_2_1_25_1","volume-title":"Quantum error-correcting codes and 4-dimensional arithmetic hyperbolic manifolds","author":"Guth L.","year":"2013"},{"key":"e_1_3_2_1_26_1","volume-title":"Quantum codes on Hurwitz surfaces. Master's thesis","author":"Kim I. H.","year":"2007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1070\/1063-7869\/44\/10S\/S29"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-4916(02)00018-0"},{"issue":"020304","key":"e_1_3_2_1_29_1","article-title":"Fault tolerance of quantum low-density parity check codes with sublinear distance scaling","volume":"87","author":"Kovalev A. A.","year":"2013","journal-title":"Phys. Rev. A"},{"key":"e_1_3_2_1_30_1","first-page":"383","article-title":"Operator quantum error correction","volume":"6","author":"Kribs D. W.","year":"2006","journal-title":"Quant. Inf. Comp."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2023715"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/0003-4916(61)90115-4"},{"key":"e_1_3_2_1_33_1","volume-title":"Information Theory, Inference, and Learning Algorithms","author":"MacKay D. J. C.","year":"2003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1013156"},{"key":"e_1_3_2_1_35_1","volume-title":"Quantum Computation and Quantum Information","author":"Nielsen M. A.","year":"2000"},{"key":"e_1_3_2_1_36_1","volume-title":"Limitations of passive protection of quantum information. Quant. Info. Comp., 10(7 & 8):0580--0618","author":"Pastawski F.","year":"2009"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.230504"},{"issue":"190504","key":"e_1_3_2_1_38_1","article-title":"Fault-tolerant quantum computation with high threshold in two dimensions","volume":"98","author":"Raussendorf R.","year":"2007","journal-title":"Phys. Rev. Lett."},{"issue":"042336","key":"e_1_3_2_1_39_1","article-title":"Topological subsystem codes from graphs and hypergraphs","volume":"86","author":"Sarvepalli P.","year":"2012","journal-title":"Phys. Rev. A"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/874062.875509"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.556668"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/44\/15\/155301"},{"key":"e_1_3_2_1_43_1","unstructured":"B. M. Terhal. Quantum error correction for quantum memories. 02 2014 http:\/\/arxiv.org\/abs\/1302.3428family arXiv:1302.3428.  B. M. Terhal. Quantum error correction for quantum memories. 02 2014 http:\/\/arxiv.org\/abs\/1302.3428family arXiv:1302.3428."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/359461.359481"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1701275.1701299"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01877-0_21"}],"event":{"name":"STOC '15: Symposium on Theory of Computing","location":"Portland Oregon USA","acronym":"STOC '15","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the forty-seventh annual ACM symposium on Theory of Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746539.2746608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746539.2746608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:17:00Z","timestamp":1750227420000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746539.2746608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,14]]},"references-count":46,"alternative-id":["10.1145\/2746539.2746608","10.1145\/2746539"],"URL":"https:\/\/doi.org\/10.1145\/2746539.2746608","relation":{},"subject":[],"published":{"date-parts":[[2015,6,14]]},"assertion":[{"value":"2015-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}