20,993 research outputs found

    What Makes a Computation Unconventional?

    Full text link
    A coherent mathematical overview of computation and its generalisations is described. This conceptual framework is sufficient to comfortably host a wide range of contemporary thinking on embodied computation and its models.Comment: Based on an invited lecture for the 'Symposium on Natural/Unconventional Computing and Its Philosophical Significance' at the AISB/IACAP World Congress 2012, University of Birmingham, July 2-6, 201

    Towards heterotic computing with droplets in a fully automated droplet-maker platform

    Get PDF
    The control and prediction of complex chemical systems is a difficult problem due to the nature of the interactions, transformations and processes occurring. From self-assembly to catalysis and self-organization, complex chemical systems are often heterogeneous mixtures that at the most extreme exhibit system-level functions, such as those that could be observed in a living cell. In this paper, we outline an approach to understand and explore complex chemical systems using an automated droplet maker to control the composition, size and position of the droplets in a predefined chemical environment. By investigating the spatio-temporal dynamics of the droplets, the aim is to understand how to control system-level emergence of complex chemical behaviour and even view the system-level behaviour as a programmable entity capable of information processing. Herein, we explore how our automated droplet-maker platform could be viewed as a prototype chemical heterotic computer with some initial data and example problems that may be viewed as potential chemically embodied computations

    Hierarchical Composition of Memristive Networks for Real-Time Computing

    Get PDF
    Advances in materials science have led to physical instantiations of self-assembled networks of memristive devices and demonstrations of their computational capability through reservoir computing. Reservoir computing is an approach that takes advantage of collective system dynamics for real-time computing. A dynamical system, called a reservoir, is excited with a time-varying signal and observations of its states are used to reconstruct a desired output signal. However, such a monolithic assembly limits the computational power due to signal interdependency and the resulting correlated readouts. Here, we introduce an approach that hierarchically composes a set of interconnected memristive networks into a larger reservoir. We use signal amplification and restoration to reduce reservoir state correlation, which improves the feature extraction from the input signals. Using the same number of output signals, such a hierarchical composition of heterogeneous small networks outperforms monolithic memristive networks by at least 20% on waveform generation tasks. On the NARMA-10 task, we reduce the error by up to a factor of 2 compared to homogeneous reservoirs with sigmoidal neurons, whereas single memristive networks are unable to produce the correct result. Hierarchical composition is key for solving more complex tasks with such novel nano-scale hardware

    A Framework for Complexity Classes in Membrane Computing

    Get PDF
    The purpose of the present work is to give a general idea about the existing results and open problems concerning the study of complexity classes within the membrane computing framework. To this aim, membrane systems (seen as computing devices) are briefly introduced, providing the basic definition and summarizing the key ideas, trying to cover the various approaches that are under investigation in this area – of course, special attention is paid to the study of complexity classes. The paper concludes with some final remarks that hint the reasons why this field (as well as other unconventional models of computation) is attracting the attention of a growing community.Ministerio de Educación y Ciencia TIN2005-09345-C04-01Junta de Andalucía TIC-58

    Applying modern portfolio theory to the analysis of terrorism: computing the set of attack method combinations from which the rational terrorist group will choose in order to maximise injuries and fatalities

    Get PDF
    In this paper, terrorism is analysed using the tools of modern portfolio theory. This approach permits the analysis of the returns that a terrorist group can expect from their activities as well as the risk they face. The analysis sheds new light on the nature of the terrorist group’s (attack method) choice set and the efficiency properties of that set. If terrorist groups are, on average, more risk averse, the economist can expect the terrorist group to exhibit a bias towards bombing and armed attack. In addition, even the riskiest (from the terrorist group’s point of view) combinations of attack methods have maximum expected returns of less than 70 injuries and fatalities per attack per year
    • …
    corecore