Skip to main content

Showing 1–3 of 3 results for author: Blakey, E

Searching in archive cs. Search in all archives.
.
  1. Ray tracing -- computing the incomputable?

    Authors: Ed Blakey

    Abstract: We recall from previous work a model-independent framework of computational complexity theory. Notably for the present paper, the framework allows formalization of the issues of precision that present themselves when one considers physical, error-prone (especially analogue rather than digital) computational systems. We take as a case study the ray-tracing problem, a Turing-machine-incomputable pro… ▽ More

    Submitted 31 March, 2014; originally announced April 2014.

    Comments: In Proceedings DCM 2012, arXiv:1403.7579

    Journal ref: EPTCS 143, 2014, pp. 32-40

  2. arXiv:1303.3176  [pdf, other

    nlin.CG cs.NI eess.SY

    Cellular Automata get their Wires Crossed

    Authors: Ed Blakey

    Abstract: In three spatial dimensions, communication channels are free to pass over or under each other so as to cross without intersecting; in two dimensions, assuming channels of strictly positive thickness, this is not the case. It is natural, then, to ask whether one can, in a suitable, two-dimensional model, cross two channels in such a way that each successfully conveys its data, in particular without… ▽ More

    Submitted 13 March, 2013; originally announced March 2013.

    Comments: 16 pages. 8 figures. Presented at NCMA 2012

  3. Complexity-Style Resources in Cryptography

    Authors: Ed Blakey

    Abstract: Previously, the author has developed a framework within which to quantify and compare the resources consumed during computational-especially unconventional computational-processes (adding to the familiar resources of run-time and memory space such non-standard resources as precision and energy); it is natural and beneficial in this framework to employ various complexity-theoretic tools and techniq… ▽ More

    Submitted 12 March, 2013; originally announced March 2013.

    Comments: 21 pages. 4 figures. To appear in Information and Computation (special issue on Information Security as a Resource)

    Journal ref: Information and Computation, vol. 226, pp. 3 - 15, 2013