pith. machine review for the scientific record. sign in

arxiv: 1708.00006 · v1 · submitted 2017-07-31 · 🪐 quant-ph · cond-mat.dis-nn· gr-qc· hep-th· math-ph· math.MP

Recognition: unknown

Tensor Networks in a Nutshell

Authors on Pith no claims yet
classification 🪐 quant-ph cond-mat.dis-nngr-qchep-thmath-phmath.MP
keywords tensorquantumassociatedgraphicallanguagemethodsnetworknetworks
0
0 comments X
read the original abstract

Tensor network methods are taking a central role in modern quantum physics and beyond. They can provide an efficient approximation to certain classes of quantum states, and the associated graphical language makes it easy to describe and pictorially reason about quantum circuits, channels, protocols, open systems and more. Our goal is to explain tensor networks and some associated methods as quickly and as painlessly as possible. Beginning with the key definitions, the graphical tensor network language is presented through examples. We then provide an introduction to matrix product states. We conclude the tutorial with tensor contractions evaluating combinatorial counting problems. The first one counts the number of solutions for Boolean formulae, whereas the second is Penrose's tensor contraction algorithm, returning the number of $3$-edge-colorings of $3$-regular planar graphs.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Quantum Circuit Cutting: Complexity and Optimization

    quant-ph 2026-04 unverdicted novelty 7.0

    Optimal quantum circuit cutting to minimize cuts is NP-complete, with an SMT solver for bounded-size partitions.

  2. Quantum-inspired tensor networks in machine learning models

    cs.LG 2026-04 unverdicted novelty 2.0

    Tensor networks developed for quantum states are reviewed as tools for machine learning models, with assessment of their potential computational, explanatory, and privacy advantages alongside remaining challenges.