New Articles (Page 247)

To stay up to date you can also follow on Mastodon.

πŸ”— Linda coordination language

πŸ”— Computer science

In computer science, Linda is a model of coordination and communication among several parallel processes operating upon objects stored in and retrieved from shared, virtual, associative memory. It was developed by Sudhir Ahuja at AT&T Bell Laboratories in collaboration with David Gelernter and Nicholas Carriero at Yale University in 1986.

Discussed on

πŸ”— Edward Tufte

πŸ”— Biography πŸ”— Mathematics πŸ”— Statistics πŸ”— Systems πŸ”— Biography/science and academia πŸ”— Systems/Visualization πŸ”— Graphic design

Edward Rolf Tufte (; born March 14, 1942) is an American statistician and professor emeritus of political science, statistics, and computer science at Yale University. He is noted for his writings on information design and as a pioneer in the field of data visualization.

Discussed on

πŸ”— Ron Conway

πŸ”— Biography πŸ”— California πŸ”— California/San Francisco Bay Area πŸ”— Finance & Investment πŸ”— Business

Ronald Crawford Conway (born March 9, 1951) is an American angel investor and philanthropist, often described as one of Silicon Valley's "super angels". Conway is recognized as a strong networker.

Discussed on

πŸ”— The official term for the smell after it rains

πŸ”— Meteorology πŸ”— Chemicals πŸ”— Soil πŸ”— Weather πŸ”— Weather/Weather

Petrichor () is the earthy scent produced when rain falls on dry soil. The word is constructed from Greek petra (πέτρα), meaning "stone", and Δ«chōr (αΌ°Ο‡ΟŽΟ), the fluid that flows in the veins of the gods in Greek mythology.

Discussed on

πŸ”— Bremermann's limit

πŸ”— Computing πŸ”— Physics πŸ”— Systems πŸ”— Systems/Cybernetics

Bremermann's limit, named after Hans-Joachim Bremermann, is a limit on the maximum rate of computation that can be achieved in a self-contained system in the material universe. It is derived from Einstein's mass-energy equivalency and the Heisenberg uncertainty principle, and is c2/h β‰ˆ 1.36Β Γ—Β 1050 bits per second per kilogram. This value is important when designing cryptographic algorithms, as it can be used to determine the minimum size of encryption keys or hash values required to create an algorithm that could never be cracked by a brute-force search.

For example, a computer with the mass of the entire Earth operating at the Bremermann's limit could perform approximately 1075 mathematical computations per second. If one assumes that a cryptographic key can be tested with only one operation, then a typical 128-bit key could be cracked in under 10βˆ’36 seconds. However, a 256-bit key (which is already in use in some systems) would take about two minutes to crack. Using a 512-bit key would increase the cracking time to approaching 1072 years, without increasing the time for encryption by more than a constant factor (depending on the encryption algorithms used).

The limit has been further analysed in later literature as the maximum rate at which a system with energy spread Ξ” E {\displaystyle \Delta E} can evolve into an orthogonal and hence distinguishable state to another, Ξ” t = Ο€ ℏ 2 Ξ” E . {\displaystyle \Delta t={\frac {\pi \hbar }{2\Delta E}}.} In particular, Margolus and Levitin have shown that a quantum system with average energy E takes at least time Ξ” t = Ο€ ℏ 2 E {\displaystyle \Delta t={\frac {\pi \hbar }{2E}}} to evolve into an orthogonal state. However, it has been shown that access to quantum memory in principle allows computational algorithms that require arbitrarily small amount of energy/time per one elementary computation step.

Discussed on

πŸ”— Angel Problem

The angel problem is a question in combinatorial game theory proposed by John Horton Conway. The game is commonly referred to as the Angels and Devils game. The game is played by two players called the angel and the devil. It is played on an infinite chessboard (or equivalently the points of a 2D lattice). The angel has a power k (a natural number 1 or higher), specified before the game starts. The board starts empty with the angel at the origin. On each turn, the angel jumps to a different empty square which could be reached by at most k moves of a chess king, i.e. the distance from the starting square is at most k in the infinity norm. The devil, on its turn, may add a block on any single square not containing the angel. The angel may leap over blocked squares, but cannot land on them. The devil wins if the angel is unable to move. The angel wins by surviving indefinitely.

The angel problem is: can an angel with high enough power win?

There must exist a winning strategy for one of the players. If the devil can force a win then it can do so in a finite number of moves. If the devil cannot force a win then there is always an action that the angel can take to avoid losing and a winning strategy for it is always to pick such a move. More abstractly, the "pay-off set" (i.e., the set of all plays in which the angel wins) is a closed set (in the natural topology on the set of all plays), and it is known that such games are determined. Of course, for any infinite game, if player 2 doesn't have a winning strategy, player 1 can always pick a move that leads to a position where player 2 doesn't have a winning strategy, but in some games, simply playing forever doesn't confer a win to player 1, and that's why undetermined games may exist.

Conway offered a reward for a general solution to this problem ($100 for a winning strategy for an angel of sufficiently high power, and $1000 for a proof that the devil can win irrespective of the angel's power). Progress was made first in higher dimensions. In late 2006, the original problem was solved when independent proofs appeared, showing that an angel can win. Bowditch proved that a 4-angel (that is, an angel with power k=4) can win and MΓ‘thΓ© and Kloster gave proofs that a 2-angel can win. At this stage, it has not been confirmed by Conway who is to be the recipient of his prize offer, or whether each published and subsequent solution will also earn $100 US.

Discussed on

πŸ”— Accidentally the first commercial lunar satellite.

πŸ”— Spaceflight πŸ”— China

PAS-22, previously known as AsiaSat 3 and then HGS-1, was a geosynchronous communications satellite, which was salvaged from an unusable geosynchronous transfer orbit by means of the Moon's gravity.

Discussed on

πŸ”— Shor's algorythm

πŸ”— Mathematics πŸ”— Physics

Shor's algorithm is a polynomial-time quantum computer algorithm for integer factorization. Informally, it solves the following problem: Given an integer N {\displaystyle N} , find its prime factors. It was invented in 1994 by the American mathematician Peter Shor.

On a quantum computer, to factor an integer N {\displaystyle N} , Shor's algorithm runs in polynomial time (the time taken is polynomial in log ⁑ N {\displaystyle \log N} , the size of the integer given as input). Specifically, it takes quantum gates of order O ( ( log ⁑ N ) 2 ( log ⁑ log ⁑ N ) ( log ⁑ log ⁑ log ⁑ N ) ) {\displaystyle O\!\left((\log N)^{2}(\log \log N)(\log \log \log N)\right)} using fast multiplication, thus demonstrating that the integer-factorization problem can be efficiently solved on a quantum computer and is consequently in the complexity class BQP. This is almost exponentially faster than the most efficient known classical factoring algorithm, the general number field sieve, which works in sub-exponential time β€” O ( e 1.9 ( log ⁑ N ) 1 / 3 ( log ⁑ log ⁑ N ) 2 / 3 ) {\displaystyle O\!\left(e^{1.9(\log N)^{1/3}(\log \log N)^{2/3}}\right)} . The efficiency of Shor's algorithm is due to the efficiency of the quantum Fourier transform, and modular exponentiation by repeated squarings.

If a quantum computer with a sufficient number of qubits could operate without succumbing to quantum noise and other quantum-decoherence phenomena, then Shor's algorithm could be used to break public-key cryptography schemes, such as the widely used RSA scheme. RSA is based on the assumption that factoring large integers is computationally intractable. As far as is known, this assumption is valid for classical (non-quantum) computers; no classical algorithm is known that can factor integers in polynomial time. However, Shor's algorithm shows that factoring integers is efficient on an ideal quantum computer, so it may be feasible to defeat RSA by constructing a large quantum computer. It was also a powerful motivator for the design and construction of quantum computers, and for the study of new quantum-computer algorithms. It has also facilitated research on new cryptosystems that are secure from quantum computers, collectively called post-quantum cryptography.

In 2001, Shor's algorithm was demonstrated by a group at IBM, who factored 15 {\displaystyle 15} into 3 Γ— 5 {\displaystyle 3\times 5} , using an NMR implementation of a quantum computer with 7 {\displaystyle 7} qubits. After IBM's implementation, two independent groups implemented Shor's algorithm using photonic qubits, emphasizing that multi-qubit entanglement was observed when running the Shor's algorithm circuits. In 2012, the factorization of 15 {\displaystyle 15} was performed with solid-state qubits. Also, in 2012, the factorization of 21 {\displaystyle 21} was achieved, setting the record for the largest integer factored with Shor's algorithm.

Discussed on

πŸ”— Antiobjects

Discussed on

πŸ”— Tell HN: There will be a Blue moon in December

πŸ”— Time πŸ”— Moon

A blue moon is an additional full moon that appears in a subdivision of a year: either the third of four full moons in a season, or a second full moon in a month of the common calendar.

The phrase in modern usage has nothing to do with the actual color of the Moon, although a visually blue Moon (the Moon appearing with a bluish tinge) may occur under certain atmospheric conditions – for instance, if volcanic eruptions or fires release particles in the atmosphere of just the right size to preferentially scatter red light.

Discussed on