In Chaotic Computing, Anarchy Rules OK
New Scientist (10/29/08) No. 2860, P. 40; Graham-Rowe, Duncan
Building next-generation computer processors by tapping the electronic parallel of chaotic weather systems is the goal of a team of physicists in the United States and India led by William Ditto of the University of Florida in Gainesville. Such processors would be vastly more powerful than their conventional chip equivalents, as well as self-reparable, through their ability to channel all their computational muscle into the task at hand and then reassign it as soon as a different chore comes up. The unpredictability of chaotic systems is the result of their sensitivity to the most infinitesimal influences, which inspired Ditto and Sudeshna Sinha of the Institute of Mathematical Sciences in Chennai to consider the construction of a circuit that exhibited chaotic behavior that could be harnessed for practical applications. Ditto and Sinha conceived of a chaotic logic gate with two inputs and one output like a conventional gate, but composed of a chaotic element or chaogate. When the chaogate receives its input signals, the internal chaotic circuit starts oscillating and quickly stabilizes at a value that relies on the inputs and a control signal. The research team calculated that changing the control signal's setting would enable the chaogate to be transformed into any desirable logic gate, and a prototype chaogate proved the concept's feasibility. Ditto is currently engaged in the commercialization of the technology and the fabrication of prototype circuits, and one of the promised advantages of chaotic logic is the dramatically reduced cost of producing custom chips. If a chip containing chaotic logic gates suffers damage, performance need not be affected as the circuits can be reconfigured to bypass the damaged area. Ditto's team has developed a method to use "chameleon" logic circuits to store data, producing digital memory that offers greater compactness than conventional memory and that also can retrieve data faster.
Wednesday, October 29, 2008
Blog: In Chaotic Computing, Anarchy Rules OK
Labels:
CSE
Subscribe to:
Post Comments (Atom)
Blog Archive
-
►
2012
(35)
- ► April 2012 (13)
- ► March 2012 (16)
- ► February 2012 (3)
- ► January 2012 (3)
-
►
2011
(118)
- ► December 2011 (9)
- ► November 2011 (11)
- ► October 2011 (7)
- ► September 2011 (13)
- ► August 2011 (7)
- ► April 2011 (8)
- ► March 2011 (11)
- ► February 2011 (12)
- ► January 2011 (15)
-
►
2010
(183)
- ► December 2010 (16)
- ► November 2010 (15)
- ► October 2010 (15)
- ► September 2010 (25)
- ► August 2010 (19)
- ► April 2010 (21)
- ► March 2010 (7)
- ► February 2010 (6)
- ► January 2010 (6)
-
►
2009
(120)
- ► December 2009 (5)
- ► November 2009 (12)
- ► October 2009 (2)
- ► September 2009 (3)
- ► August 2009 (16)
- ► April 2009 (4)
- ► March 2009 (20)
- ► February 2009 (9)
- ► January 2009 (19)
-
▼
2008
(139)
- ► December 2008 (15)
- ► November 2008 (16)
-
▼
October 2008
(17)
- Blog: HIPAA Security Rule; new implementation guide
- Blog: European Computer Scientists Seek New Framew...
- Blog: Ozzie responds: Is Microsoft Azure just 'Hai...
- Blog: In Chaotic Computing, Anarchy Rules OK
- Blog: Enterprise readiness of Cloud ratcheting up
- Blog: Good Code, Bad Computations: A Computer Secu...
- Blog: Microsoft's Azure cloud platform: A guide fo...
- Blog: Computer Circuit Built From Brain Cells
- Blog: Computing With RNA
- Blog: Probe Sees Unused Internet
- Blog: Study: Use of Ruby Language on the Rise
- Blog: Dynamic Programming Futures
- Blog: UK University Holds Artificial Intelligence ...
- Blog: Academics Sink Teeth Into Yahoo Search Service
- Blog: Researchers Show How to Crack Popular Smart ...
- Blog: 'Intelligent' Computers Put to the Test
- Blog: NIST Issues Three IT Security Documents; SP ...
- ► September 2008 (2)
- ► August 2008 (2)
- ► April 2008 (12)
- ► March 2008 (25)
- ► February 2008 (16)
- ► January 2008 (6)
-
►
2007
(17)
- ► December 2007 (4)
- ► November 2007 (4)
- ► October 2007 (7)
Blog Labels
- research
- CSE
- security
- software
- web
- AI
- development
- hardware
- algorithm
- hackers
- medical
- machine learning
- robotics
- data-mining
- semantic web
- quantum computing
- Cloud computing
- cryptography
- network
- EMR
- search
- NP-complete
- linguistics
- complexity
- data clustering
- optimization
- parallel
- performance
- social network
- HIPAA
- accessibility
- biometrics
- connectionist
- cyber security
- passwords
- voting
- XML
- biological computing
- neural network
- user interface
- DNS
- access control
- firewall
- graph theory
- grid computing
- identity theft
- project management
- role-based
- HTML5
- NLP
- NoSQL
- Python
- cell phone
- database
- java
- open-source
- spam
- GENI
- Javascript
- SQL-Injection
- Wikipedia
- agile
- analog computing
- archives
- biological
- bots
- cellular automata
- computer tips
- crowdsourcing
- e-book
- equilibrium
- game theory
- genetic algorithm
- green tech
- mobile
- nonlinear
- p
- phone
- prediction
- privacy
- self-book publishing
- simulation
- testing
- virtual server
- visualization
- wireless
No comments:
Post a Comment