20,993 research outputs found
What Makes a Computation Unconventional?
A coherent mathematical overview of computation and its generalisations is
described. This conceptual framework is sufficient to comfortably host a wide
range of contemporary thinking on embodied computation and its models.Comment: Based on an invited lecture for the 'Symposium on
Natural/Unconventional Computing and Its Philosophical Significance' at the
AISB/IACAP World Congress 2012, University of Birmingham, July 2-6, 201
Towards heterotic computing with droplets in a fully automated droplet-maker platform
The control and prediction of complex chemical systems is a difficult problem due to the nature of the interactions, transformations and processes occurring. From self-assembly to catalysis and self-organization, complex chemical systems are often heterogeneous mixtures that at the most extreme exhibit system-level functions, such as those that could be observed in a living cell. In this paper, we outline an approach to understand and explore complex chemical systems using an automated droplet maker to control the composition, size and position of the droplets in a predefined chemical environment. By investigating the spatio-temporal dynamics of the droplets, the aim is to understand how to control system-level emergence of complex chemical behaviour and even view the system-level behaviour as a programmable entity capable of information processing. Herein, we explore how our automated droplet-maker platform could be viewed as a prototype chemical heterotic computer with some initial data and example problems that may be viewed as potential chemically embodied computations
Hierarchical Composition of Memristive Networks for Real-Time Computing
Advances in materials science have led to physical instantiations of
self-assembled networks of memristive devices and demonstrations of their
computational capability through reservoir computing. Reservoir computing is an
approach that takes advantage of collective system dynamics for real-time
computing. A dynamical system, called a reservoir, is excited with a
time-varying signal and observations of its states are used to reconstruct a
desired output signal. However, such a monolithic assembly limits the
computational power due to signal interdependency and the resulting correlated
readouts. Here, we introduce an approach that hierarchically composes a set of
interconnected memristive networks into a larger reservoir. We use signal
amplification and restoration to reduce reservoir state correlation, which
improves the feature extraction from the input signals. Using the same number
of output signals, such a hierarchical composition of heterogeneous small
networks outperforms monolithic memristive networks by at least 20% on waveform
generation tasks. On the NARMA-10 task, we reduce the error by up to a factor
of 2 compared to homogeneous reservoirs with sigmoidal neurons, whereas single
memristive networks are unable to produce the correct result. Hierarchical
composition is key for solving more complex tasks with such novel nano-scale
hardware
A Framework for Complexity Classes in Membrane Computing
The purpose of the present work is to give a general idea about the existing results and open problems
concerning the study of complexity classes within the membrane computing framework. To this aim,
membrane systems (seen as computing devices) are briefly introduced, providing the basic definition and
summarizing the key ideas, trying to cover the various approaches that are under investigation in this area
– of course, special attention is paid to the study of complexity classes. The paper concludes with some
final remarks that hint the reasons why this field (as well as other unconventional models of computation)
is attracting the attention of a growing community.Ministerio de EducaciĂłn y Ciencia TIN2005-09345-C04-01Junta de AndalucĂa TIC-58
Applying modern portfolio theory to the analysis of terrorism: computing the set of attack method combinations from which the rational terrorist group will choose in order to maximise injuries and fatalities
In this paper, terrorism is analysed using the tools of modern portfolio theory. This approach permits the analysis of the returns that a terrorist group can expect from their activities as well as the risk they face. The analysis sheds new light on the nature of the terrorist group’s (attack method) choice set and the efficiency properties of that set. If terrorist groups are, on average, more risk averse, the economist can expect the terrorist group to exhibit a bias towards bombing and armed attack. In addition, even the riskiest (from the terrorist group’s point of view) combinations of
attack methods have maximum expected returns of less than 70 injuries and fatalities per attack per year
- …