946 research outputs found
Time's Barbed Arrow: Irreversibility, Crypticity, and Stored Information
We show why the amount of information communicated between the past and
future--the excess entropy--is not in general the amount of information stored
in the present--the statistical complexity. This is a puzzle, and a
long-standing one, since the latter is what is required for optimal prediction,
but the former describes observed behavior. We layout a classification scheme
for dynamical systems and stochastic processes that determines when these two
quantities are the same or different. We do this by developing closed-form
expressions for the excess entropy in terms of optimal causal predictors and
retrodictors--the epsilon-machines of computational mechanics. A process's
causal irreversibility and crypticity are key determining properties.Comment: 4 pages, 2 figure
Prediction, Retrodiction, and The Amount of Information Stored in the Present
We introduce an ambidextrous view of stochastic dynamical systems, comparing
their forward-time and reverse-time representations and then integrating them
into a single time-symmetric representation. The perspective is useful
theoretically, computationally, and conceptually. Mathematically, we prove that
the excess entropy--a familiar measure of organization in complex systems--is
the mutual information not only between the past and future, but also between
the predictive and retrodictive causal states. Practically, we exploit the
connection between prediction and retrodiction to directly calculate the excess
entropy. Conceptually, these lead one to discover new system invariants for
stochastic dynamical systems: crypticity (information accessibility) and causal
irreversibility. Ultimately, we introduce a time-symmetric representation that
unifies all these quantities, compressing the two directional representations
into one. The resulting compression offers a new conception of the amount of
information stored in the present.Comment: 17 pages, 7 figures, 1 table;
http://users.cse.ucdavis.edu/~cmg/compmech/pubs/pratisp.ht
Synchronization and Control in Intrinsic and Designed Computation: An Information-Theoretic Analysis of Competing Models of Stochastic Computation
We adapt tools from information theory to analyze how an observer comes to
synchronize with the hidden states of a finitary, stationary stochastic
process. We show that synchronization is determined by both the process's
internal organization and by an observer's model of it. We analyze these
components using the convergence of state-block and block-state entropies,
comparing them to the previously known convergence properties of the Shannon
block entropy. Along the way, we introduce a hierarchy of information
quantifiers as derivatives and integrals of these entropies, which parallels a
similar hierarchy introduced for block entropy. We also draw out the duality
between synchronization properties and a process's controllability. The tools
lead to a new classification of a process's alternative representations in
terms of minimality, synchronizability, and unifilarity.Comment: 25 pages, 13 figures, 1 tabl
Information Accessibility and Cryptic Processes: Linear Combinations of Causal States
We show in detail how to determine the time-reversed representation of a
stationary hidden stochastic process from linear combinations of its
forward-time -machine causal states. This also gives a check for the
-cryptic expansion recently introduced to explore the temporal range over
which internal state information is spread.Comment: 6 pages, 9 figures, 2 tables;
http://users.cse.ucdavis.edu/~cmg/compmech/pubs/iacplcocs.ht
Discrimination, Crypticity, and Incipient Taxa in Entamoeba
Persistent difficulties in resolving clear lineages in diverging populations of prokaryotes or unicellular eukaryotes (protistan polyphyletic groups) are challenging the classical species concept. Although multiple integrated approaches would render holistic taxonomies, most phylogenetic studies are still based on single-gene or morphological traits. Such methodologies conceal natural lineages, which are considered “cryptic.” The concept of species is considered artificial and inadequate to define natural populations. Social organisms display differential behaviors toward kin than to nonrelated individuals. In “social” microbes, kin discrimination has been used to help resolve crypticity. Aggregative behavior could be explored in a nonsocial protist to define phylogenetic varieties that are considered “cryptic.” Two Entamoeba invadens strains, IP-1 and VK-1:NS are considered close populations of the same “species.” This study demonstrates that IP-1 and VK-1:NS trophozoites aggregate only with alike members and discriminate members of different strains based on behavioral and chemical signals. Combined morphological, behavioral/chemical, and ecological studies could improve Archamoebae phylogenies and define cryptic varieties. Evolutionary processes in which selection acted continuously and cumulatively on ancestors of Entamoeba populations gave rise to chemical and behavioral signals that allowed individuals to discriminate nonpopulation members and, gradually, to the emergence of new lineages; alternative views that claim a “Designer” or “Creator” as responsible for protistan diversity are unfounded
A Closed-Form Shave from Occam's Quantum Razor: Exact Results for Quantum Compression
The causal structure of a stochastic process can be more efficiently
transmitted via a quantum channel than a classical one, an advantage that
increases with codeword length. While previously difficult to compute, we
express the quantum advantage in closed form using spectral decomposition,
leading to direct computation of the quantum communication cost at all encoding
lengths, including infinite. This makes clear how finite-codeword compression
is controlled by the classical process' cryptic order and allows us to analyze
structure within the length-asymptotic regime of infinite-cryptic order (and
infinite Markov order) processes.Comment: 21 pages, 13 figures;
http://csc.ucdavis.edu/~cmg/compmech/pubs/eqc.ht
Compensatory evolution and the origins of innovations
Cryptic genetic sequences have attenuated effects on phenotypes. In the
classic view, relaxed selection allows cryptic genetic diversity to build up
across individuals in a population, providing alleles that may later contribute
to adaptation when co-opted - e.g. following a mutation increasing expression
from a low, attenuated baseline. This view is described, for example, by the
metaphor of the spread of a population across a neutral network in genotype
space. As an alternative view, consider the fact that most phenotypic traits
are affected by multiple sequences, including cryptic ones. Even in a strictly
clonal population, the co-option of cryptic sequences at different loci may
have different phenotypic effects and offer the population multiple adaptive
possibilities. Here, we model the evolution of quantitative phenotypic
characters encoded by cryptic sequences, and compare the relative contributions
of genetic diversity and of variation across sites to the phenotypic potential
of a population. We show that most of the phenotypic variation accessible
through co-option would exist even in populations with no polymorphism. This is
made possible by a history of compensatory evolution, whereby the phenotypic
effect of a cryptic mutation at one site was balanced by mutations elsewhere in
the genome, leading to a diversity of cryptic effect sizes across sites rather
than across individuals. Cryptic sequences might accelerate adaptation and
facilitate large phenotypic changes even in the absence of genetic diversity,
as traditionally defined in terms of alternative alleles
Semidistributive Inverse Semigroups, II
The description by Johnston-Thom and the second author of the inverse semigroups S for which the lattice LJ(S) of full inverse subsemigroups of S is join semidistributive is used to describe those for which (a) the lattice L(S) of all inverse subsemigroups or (b) the lattice lo(S) of convex inverse subsemigroups have that property. In contrast with the methods used by the authors to investigate lower semimodularity, the methods are based on decompositions via GS, the union of the subgroups of the semigroup (which is necessarily cryptic)
- …
