ARCHIVES
Review Article
Willow Chip Technology and the Future of Cloud Robotics: A Review
Dr. Rishi Kumar Sharma1
Sunil Kushwaha2
Dharmendra Kumar3
Umesh Sahu4
Sumit Dave5
Deepika kumari Agrawal6
1Associate Professor, CSE Jagannath University, Jaipur, Rajasthan, India. 2345Assistant Professor, FCE Poornima University, Jaipur, Rajasthan, India. 6Assistant Professor, CSE Jagannath University, Jaipur, Rajasthan, India.
Published Online: May-August 2025
Pages: 311-314
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250402040References
[1] https://www.hpcwire.com/2024/12/09/google-debuts-new-quantum- chip-error-correction-breakthrough-and-roadmap-details/
[2] https://blog.google/technology/research/google-willow-quantum-chip/
[3] https://quantumcomputingreport.com/google-unveils-the-105-qubit-willow-chip-and-demonstrates-new-levels-of-rcs-benchmark-performance-
and-quantum-error-correction-below-the- threshold/: :text=Google
[4] https://www.secureworld.io/industry-news/microsoft-majorana-1- quantum-computing: :text=Majorana-based
[5] Dr Rishi Kumar Sharma,” Cloud Robotics: Current Security Status and Device Authentication On The Remote Location” IJIEMR,
ELSEVIER SSRN, 2024.
[2] https://blog.google/technology/research/google-willow-quantum-chip/
[3] https://quantumcomputingreport.com/google-unveils-the-105-qubit-willow-chip-and-demonstrates-new-levels-of-rcs-benchmark-performance-
and-quantum-error-correction-below-the- threshold/: :text=Google
[4] https://www.secureworld.io/industry-news/microsoft-majorana-1- quantum-computing: :text=Majorana-based
[5] Dr Rishi Kumar Sharma,” Cloud Robotics: Current Security Status and Device Authentication On The Remote Location” IJIEMR,
ELSEVIER SSRN, 2024.
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025