Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

CS 101: An Introduction to Computer

Science for Everyone


Computers and Computation
Fall 2015

Contents
1 The Antikythera mechanism: The clockwork computer 2

2 What is Computation? 4

3 Computational Thinking 10

4 The Many Facets of Natural Computing 13

5 Why Johnny Cant Steam: How video copyright went insane 25

6 Could your iPod be holding the greatest mystery in modern science 32

7 Scooping the Loop Snooper: a proof that the halting problem is undecid-
able 36

1
11 THE ANTIKYTHERA MECHANISM: THE CLOCKWORK COMPUTER 2

The Antikythera mechanism


The clockwork computer
An ancient piece of clockwork shows the deep roots of modern technology
Sep 19th 2002 | from the print edition
WHEN a Greek sponge diver called Elias Stadiatos discovered the
wreck of a cargo ship off the tiny island of Antikythera in 1900, it
was the statues lying on the seabed that made the greatest
impression on him. He returned to the surface, removed his helmet,
and gabbled that he had found a heap of dead, naked women. The
ship's cargo of luxury goods also included jewellery, pottery, fine
furniture, wine and bronzes dating back to the first century BC. But
the most important finds proved to be a few green, corroded
lumps—the last remnants of an elaborate mechanical device.

The Antikythera mechanism, as it is now known, was originally housed in a wooden box about the
size of a shoebox, with dials on the outside and a complex assembly of bronze gear wheels within.
X-ray photographs of the fragments, in which around 30 separate gears can be distinguished, led
the late Derek Price, a science historian at Yale University, to conclude that the device was an
astronomical computer capable of predicting the positions of the sun and moon in the zodiac on
any given date. A new analysis, though, suggests that the device was cleverer than Price thought,
and reinforces the evidence for his theory of an ancient Greek tradition of complex mechanical
technology.

Michael Wright, the curator of mechanical engineering at the Science Museum in London, has
based his new analysis on detailed X-rays of the mechanism using a technique called linear
tomography. This involves moving an X-ray source, the film and the object being investigated
relative to one another, so that only features in a particular plane come into focus. Analysis of the
resulting images, carried out in conjunction with Allan Bromley, a computer scientist at Sydney
University, found the exact position of each gear, and suggested that Price was wrong in several
respects.

In some cases, says Mr Wright, Price seems to have “massaged” the number of teeth on particular
gears (most of which are, admittedly, incomplete) in order to arrive at significant astronomical
ratios. Price's account also, he says, displays internal contradictions, selective use of evidence and
unwarranted speculation. In particular, it postulates an elaborate reversal mechanism to get some
gears to turn in the right direction.

Since so little of the mechanism survives, some guesswork is unavoidable. But Mr Wright noticed a
fixed boss at the centre of the mechanism's main wheel. To his instrument-maker's eye, this was
suggestive of a fixed central gear around which other moving gears could rotate. This does away
with the need for Price's reversal mechanism and leads to the idea that the device was specifically
designed to model a particular form of “epicyclic” motion.

The Greeks believed in an earth-centric universe and accounted for celestial bodies' motions using
elaborate models based on epicycles, in which each body describes a circle (the epicycle) around a
point that itself moves in a circle around the earth. Mr Wright found evidence that the Antikythera
mechanism would have been able to reproduce the motions of the sun and moon accurately, using

“The Antikythera mechanism: The clockwork computer.” Economist, Sep 19th 2002. Copyright The Economist. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://www.economist.com/node/1337165.
1 THE ANTIKYTHERA MECHANISM: THE CLOCKWORK COMPUTER 3

an epicyclic model devised by Hipparchus, and of the planets Mercury and Venus, using an
epicyclic model derived by Apollonius of Perga. (These models, which predate the mechanism,
were subsequently incorporated into the work of Claudius Ptolemy in the second century AD.)

A device that just modelled the motions of the sun, moon, Mercury and Venus does not make
much sense. But if an upper layer of mechanism had been built, and lost, these extra gears could
have modelled the motions of the three other planets known at the time—Mars, Jupiter and
Saturn. In other words, the device may have been able to predict the positions of the known
celestial bodies for any given date with a respectable degree of accuracy, using bronze pointers on
a circular dial with the constellations of the zodiac running round its edge.

Mr Wright devised a putative model in which the mechanisms for each celestial body stack up like
layers in a sandwich, and started building it in his workshop. The completed reconstruction, details
of which appeared in an article in the Horological Journal in May, went on display this week at
Technopolis, a museum in Athens. By winding a knob on the side, celestial bodies can be made to
advance and retreat so that their positions on any chosen date can be determined. Mr Wright says
his device could have been built using ancient tools because the ancient Greeks had saws whose
teeth were cut using v-shaped files—a task that is similar to the cutting of teeth on a gear wheel.
He has even made several examples by hand.

How closely this reconstruction matches up to the original will never be known. The purpose of
two dials on the back of the device is still unclear, although one may indicate the year. Nor is the
device's purpose obvious: it may have been an astrological computer, used to speed up the
casting of horoscopes, though it might just as easily have been a luxury plaything. But Mr Wright
is convinced that his epicyclic interpretation is correct, and that the original device modelled the
entire known solar system.

The Greeks had a word for it

That tallies with ancient sources that refer to such devices. Cicero, writing in the first century BC,
mentions an instrument “recently constructed by our friend Poseidonius, which at each revolution
reproduces the same motions of the sun, the moon and the five planets.” Archimedes is also said
to have made a small planetarium, and two such devices were said to have been rescued from
Syracuse when it fell in 212BC. This reconstruction suggests such references can now be taken
literally.

It also provides strong support for Price's theory. He believed that the mechanism was strongly
suggestive of an ancient Greek tradition of complex mechanical technology which, transmitted via
the Arab world, formed the basis of European clockmaking techniques. This fits with another,
smaller device that was acquired in 1983 by the Science Museum, which models the motions of
the sun and moon. Dating from the sixth century AD, it provides a previously missing link between
the Antikythera mechanism and later Islamic calendar computers, such as the 13th century
example at the Museum of the History of Science in Oxford. That device, in turn, uses techniques
described in a manuscript written by al-Biruni, an Arab astronomer, around 1000AD.

The origins of much modern technology, from railway engines to robots, can be traced back to the
elaborate mechanical toys, or automata, that flourished in the 18th century. Those toys, in turn,
grew out of the craft of clockmaking. And that craft, like so many other aspects of the modern
world, seems to have roots that can be traced right back to ancient Greece.

Copyright © The Economist Newspaper Limited 2012. All rights reserved.

“The Antikythera mechanism: The clockwork computer.” Economist, Sep 19th 2002. Copyright The Economist. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://www.economist.com/node/1337165.
22 WHAT IS COMPUTATION? 4

E D C Z Y X
B A W

What is
B
A

V
C
Z

U
Computation? D
Y

T
E
X

S
F

R
W

G
Our culture is in the process of renegotiating what it thinks computation and
computer really mean.

Q
V

By Ian Horswill
H

DOI: 10.1145/2090276.2090283

I
P
U

n the 19th century, our society fundamentally changed the way it produced material
I

O
goods. Whereas production had previously depended on human and animal labor, the
T J
S steam engine allowed much of that labor to be transferred to machines. This made K N
the manufacture of many goods and services more efficient, and therefore cheaper. It
Q R L M
also made other kinds of products available that would otherwise have been impossible to
manufacture. Resulting in widespread economic dislocation, skilled tradesmen were no
longer needed. Much of the population were forced to leave their rural communities for
cities, radically changing the very environment they lived in. Consumer culture, television,
corporations, and the automobile would not have been possible—or at least as influential—
P O N without this automation of production, better knownZ as the Y
Industrial
X Revolution.
M
We now hear we’re in the midst of A
about the esoteric worship of acro- W
is “just” computation, then what isn’t
an “information evolution.” Like the nyms and punctuation. computation? And what does it even
Industrial Revolution, it involves auto- B mean to say that something is or isn’t
WHAT ISN’T COMPUTATION
V
mation—the transfer of human labor computation?
L

to machines. However physical labor Computation isn’t tied to numbers, Computation is an idea in flux. One
C

has been replaced by intellectual la- acronyms, punctuation, or syntax. But hundred years ago, nearly everyone
U
K

bor. While we cannot know the ulti- one of the things that makes computa- thought of computation as being a
mate consequences of these changes, tion so interesting is that, in all hones- mental operation involving numbers.
D

information technology has played ty, it is not entirely clear what compu- And being a mental operation, it could
T
J

an increasingly central role in our so- tation really is. We all generally agree only be done by people. Today, the
ciety over the past two decades. In the that when someone balances their overwhelming majority of what we con-
E

1950s, if you and your friends wanted checkbook, they’re doing computa- sider to be computation is done by ma-
I

to go to a movie, you wouldn’t have tion. But many people argue the brain chines. But at the same time, we still
started by walking to the library. But is fundamentally a computer. If that’s somehow associate it with thought. In
F

today you wouldn’t think twice about true, does it mean that (all) thought is Western culture, we tend to take our
H

checking the Internet for reviews and computation? Or that all computation capacity for thought as the central dis-
R

show times. Similarly, average people is thought? We know that the “virtual” tinction between ourselves and other
G

wouldn’t have published their diaries environments in computer games are animals. Moreover, we view our spe-
G

in the 1950s, but today people blog really just computational simulations. cific thoughts and feelings as being
Q

about everything from international But it has also been argued that the one of the major constituents of our
Illustration by James Joyce

politics to their pets’ favorite toys. real universe is effectively a computer, personal identity. So thought is consti-
H

Yet for all the importance of these that quantum physics is really about tutive both of our collective humanity
F

technologies, people still tend to think information, and that matter and en- and of our individual identities.
I

of computation as being about num-


E ergy are really just abstractions built Changing our ideas about computa-
O
bers, and computer science as being from information. But if the universe
J tion changes our ideas about thought
D N
B C X R D S Ł     
Ť Ţ ţ Ť Ł    ĩ ţ Ū  Ł   ĩ ť
K L M 9

Ian Horswill, “What is Computation?.” XRDS, March 2012. Copyright Association for Computing Machinery. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://xrds.acm.org/article.cfm?aid=2090283.
2 WHAT IS COMPUTATION? 5

and therefore our ideas about our- answer in whatever representational describe procedures, construct them,
selves. It reverberates through our cul- system or systems they happened to be and compare competing procedures
ture, producing excitement, anxiety, using, we consider them to have suc- for solving the same computational
and countless B-movies about virtual cessfully done the arithmetic. Put an- problem.
reality and cyber-thingies. other way, it doesn’t matter which path
And yet for all our collective fascina- we take through the diagram below: THE IMPERATIVE MODEL
tion with computation, what we mean by The functional model is a pretty good
the term is still somewhat mysterious. model of what we mean by computa-
Writing Writing tion; it covers all of math and a lot of
add2 programming. But it assumes com-
QUESTIONS AND ANSWERS putations (1) read an input, think for
Suppose you ask someone: “What’s a while, write an output, and halt;
seven plus three?”If they reply and (2) the only important aspect of a
Write Read
“10,” then they just performed a program’s behavior is the relation be-
computation. So we can provisionally tween its input and output.
think of computation as a kind of The problem is our arithmetic ex-
question-answering. In the case of ample, like modern von Neumann
addition, the question always involves Speech Speech computers, worked by gradually modi-
a pair of numbers and the answer add1 fying scratch paper—writing carries
is always another number. For any down, partial sums, etc. And the act of
particular addition question, there’s a writing a carry mark on scratch paper,
corresponding number, determined We’ll call this the principle of be- like the act of storing a register to main
by the pair of numbers, which is the havioral equivalence: If a person or memory, isn’t best thought of as com-
desired answer. system reliably produces the right an- puting a function, per se; it is an im-
Now suppose you ask them “What’s swer, they can be considered to have perative. It’s an operation that works
one million, seven hundred eighty-two solved the problem regardless of what by modifying the internal state of the
thousand, six hundred, and seventy- procedure or representation(s) they machine. So we have the embarrassing
eight plus three million, two hundred used. Behavioral equivalence is abso- situation that our model doesn’t con-
ninety-two thousand, seven hundred lutely central to the modern notion of sider the steps of our computations to
and four?” Unless they’re especially computation. If we replace one compu- be computations.
good at mental arithmetic, they won’t tational system with another that has Moreover, many computations just
be able to keep all the numbers in their the “same” behavior, the computation don’t fit into the functional model.
head and so they’ll have to take out will still “work.” Does the delete file command on your
pencil and paper, ask you to repeat the laptop produce an output? Not really.
question, write it down, perform the ad- THE FUNCTIONAL MODEL Whereas the modification of memory
dition on paper, and read off the answer. The question is what it means to have may be a side effect of an arithmetic
But now arithmetic is no longer just the “same” behavior. For question- program, it’s the very purpose of de-
a mental operation; it’s also a physical answering, it means giving the same letion; and an animation program’s
operation. It involves manipulation answers to the same questions; that is, purpose is to draw successive frames
and change of physical objects (the generating the same output. We can to video memory. Nor do all programs
pencil and paper). We’re used to think- provisionally think of a computation- terminate; you actually want your op-
ing of the arithmetic as a “mental” al problem as a function from a set of erating system or anti-lock brake con-
thing that takes place “in” our heads. possible inputs (the questions) to their troller to be infinite loops! These are
But in this case, it’s spread out between desired outputs (the answers). If we as- all computations that:
a person’s head, hands, pencil, and pa- sume that the only important part of a š7h[f[h\ehc[Zc[Y^Wd_YWbbo$
per. Another change from the seven- computation’s behavior is its output, š:eiec[j^_d]ki[\kb$
plus-three example is that while we then we have a functional model of š:e_jki_d][nWYjboj^[iWc[fh_c_-
presented the numbers to the person computation. Procedures are just ways tive instructions that “normal”
as a set of sounds in spoken English, of computing functions and so two procedures use.
they then represented them as symbols procedures are behaviorally equivalent
on paper, presumably Arabic numer- if and only if they compute the same But these aren’t considered com-
als. (In fact, “the numbers themselves” function, although they may differ in putations under the functional model
never even made an appearance, since efficiency. because they don’t compute functions.
they’re completely intangible; we only Procedures differ from functions There is another model of computa-
have access to them through represen- in that functions only specify what tion, the imperative model: Computa-
tations.) their outputs should be, whereas pro- tions are sequences of imperatives that
What’s interesting here is that none cedures specify how to compute them. manipulate representations. The ad-
of these differences matter. So long Computer science is in many ways the vantage of this model is that it’s more
as the person comes up with the right study of procedural knowledge: How to inclusive than the functional model.

10 X R D S Ł     
 Ť Ţ ţ Ť  Ł     ĩ ţ Ū  Ł   ĩ ť

Ian Horswill, “What is Computation?.” XRDS, March 2012. Copyright Association for Computing Machinery. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://xrds.acm.org/article.cfm?aid=2090283.
2 WHAT IS COMPUTATION? 6

The disadvantage is that it’s hard to rea- devised clever ways of encoding other bit strings. Given that, we can write a
son about programs at this level. Com- representations as binary text strings, meta-program for one computer to in-
putations in the functional model have including human text, tree and graph terpret or emulate the instruction set
simple specifications—the function to structures, pictures, and sound. of another. The emulator makes the
be computed—and while proving that a machines behaviorally equivalent.
program satisfies the specification may META-PROGRAMMING There are a few obvious issues with
be hard, it’s at least a clearly defined no- Modern digital computers are charac- simulation. The simulated machine
tion. Under the imperative model, it can terized by: will be slower. And a computer with
be difficult even to write a specification, 64K of memory can’t simulate one with
much less determine whether an imple- š7kd_Ò[Zc[jW#h[fh[i[djWj_edX_- 100GB. But can one computer always
mentation satisfies it. nary text strings) in which all other simulate another if it has enough mem-
Now that we have a couple of differ- representations can be encoded. ory? The question matters because if A
ent ways to think about computation, š7i[je\Xk_bj#_dYeccWdZi\ehcW- can simulate B but B can’t simulate A,
let’s think about what we mean by nipulating binary text. then we know A can perform at least
computers and what makes them un- šJ^[ WX_b_jo je ijeh[ i[gk[dY[i e\ one computational task that B can’t—A
usual as a kind of mechanism. commands (i.e. procedures) in is in some sense more powerful than B.
memory as binary text. So the question is: Is there an instruc-
COMPUTERS šJ^[ WX_b_jo je _dj[hfh[j [n[Ykj[ tion set that’s sufficient for simulating
Although computation always involves previously stored procedures. any kind of computer with any kind of
the manipulation of representations, instruction set?
the modern digital computer has the The fact that procedures are stored We have the answer, and that an-
additional property that those proce- in the same bit-string format as other swer is “probably.”
dures are themselves representations. data has profound consequences; it al-
They can be manipulated like any oth- lows us to write meta-programs that UNIVERSALITY
er data: copied, modified, erased, etc. examine, manipulate, and even create The first machines that could simu-
Procedures differ from other represen- other procedures. late other computers were designed by
tations only in the machine is able to While programmability makes British mathematician Alan Turing,
interpret (execute) them. This provides computer hardware economically vi- and so are now referred to as Turing
us with one of the two defining charac- able, meta-programmability makes machines [1]. Most Turing machines
teristics of modern digital computers: software economically viable. Humans weren’t even programmable, but Tur-
programmability. are the scarcest and most expensive ing showed there was a particular kind
Programmability allows a single resource in the computer industry. So of Turing machine, which he called the
device to serve many different func- just as the Industrial Revolution re- Universal Machine, which could take
tions, simply by changing a stored quired the use of machines to make representations of other Turing ma-
representation inside the device. Al- machines, software engineering re- chines and simulate them. That meant
though easy to take for granted, it quires the use of software to make soft- the Universal Machine was not only
is this programmability that makes ware. Consequently, the overwhelming programmable, it could compute any-
computers the social and economic historical trend in software develop- thing that any Turing machine could
force that they are today. Computers ment has been to automate more and compute.
could never have become economi- more of the development task, even The details of Turing machines
cally viable if consumers had to buy at the expense of writing less efficient aren’t important to this discussion.
separate machines for email, text pro- programs that require more powerful What matters is that they can simulate
cessing, and Web browsing. computers. all the computers we’ve managed to
The second defining property of All the tools we take for granted as think up, and consequently can com-
modern digital computers is their use programmers—compilers, debuggers, pute anything those computers can
of a single uniform meta-representa- profilers, static checkers, testing rigs, compute. This means any computer
tion for all types of data, namely text. and even source-code management that’s able to simulate Turing’s Uni-
Computer text is like any other text— systems—are meta-programs. They au- versal Machine is also able to simu-
strings of symbols drawn from a fixed tomate mundane aspects of program- late any computer, and therefore able
alphabet. The only interesting differ- ming, freeing you to focus on the tasks to compute anything we know how to
ence from any other text is that it uses that require human creativity. compute. This property of being able
an alphabet with only two symbols, to simulate Turing machines, and
conventionally called 0 and 1. The SIMULATION therefore being able to simulate any
choice of a binary alphabet is ultimate- Although all modern computers share known computer, is called “Turing
ly a matter of engineering convenience: the same broad traits, they can’t nec- completeness,” “Turing equivalence,”
It’s easier to make a reliable electronic essarily run one another’s programs. or just “universality.”
memory circuit if it only has to reli- Yet any computer can at least store any The amazing thing is that nearly
ably distinguish between two sym- other computer’s programs, because all digital computers are Turing com-
bols. And over the last 50 years, we’ve all modern computers store data as plete. In fact, some stunningly simple

X R D S Ł     
Ť Ţ ţ Ť Ł    ĩ ţ Ū  Ł   ĩ ť 11

Ian Horswill, “What is Computation?.” XRDS, March 2012. Copyright Association for Computing Machinery. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://xrds.acm.org/article.cfm?aid=2090283.
2 WHAT IS COMPUTATION? 7

other machines could compute. It


turns out that not only are some prob-
lems provably uncomputable, but in a
sense it’s the very power of universal
machines that makes those problems
uncomputable.
If we return to the idea of offload-
ing parts of the software development
task to the computer, we can see that
people have developed meta-pro-
grams for detecting many different
kinds of common bugs: type check-
ers for finding type errors, memory
debuggers for finding leaks, deadlock
detectors, and so on. And yet, every
computer user has the experience
of having their machines hang on
a far too regular basis. So if we can
perform automated detection of type
errors, why can’t we perform automat-
ed detection of infinite loops?
The automated detection of infinite
loops is known as the halting problem:
Given a program and a potential input
for it, determine whether the program
would ever halt if it were run on that
input. It’s hard because running for a
long time doesn’t always mean that a
program is hung; it’s always possible
Image courtesy of Flickr user Dino Gravato

that it’s about to finish and give you an


answer.
One might think we’d be able to use a
simulator to solve the halting problem.
After all, a simulator tells us the exact
output a program generates. That’s ac-
tually more information than we need,
since we just care whether there will be
an output. Unfortunately, this doesn’t
work. The problem is that since simu-
lators run the programs they simulate,
if the simulated program runs forever,
so does the simulator.
mechanisms are Turing complete [2]. plete system) or is weaker than a Tur- Let’s think for a moment about what
One of the practical consequences of ing machine (i.e. can’t simulate a Tur- it would mean for the halting problem
this is that hardware designers can ing machine but can still be simulated to be computable. If the halting prob-
largely ignore the issue of whether by a Turing machine). So it is generally lem were computable, we could write
their instruction sets are universal assumed that any function that can be a meta-procedure called halts() that
(they are) and focus on finding instruc- computed can be computed by a Tur- took two inputs, a procedure and an
tion sets that can be made to run very ing machine. This is known as Church’s input to run it on, which would infalli-
quickly in hardware. Thesis, or sometimes as the Church- bly output “yes” or “no” depending on
Of course this doesn’t preclude the Turing Hypothesis, after 20th century whether the specified procedure would
possibility that someone might some- meta-mathematician Alonzo Church. halt if run on the specified input. That
day come up with a radically different turns out to be the difficulty with the
design for a computer that couldn’t be THE LIMITS OF COMPUTATION halting problem, because it leads to a
simulated by a Turing machine. But You may have noticed a certain care- paradox. For if we could solve the halt-
thus far, every computational system fulness of wording in our definition of ing problem—if we could write the
that’s been devised has either been universality. We didn’t say that univer- halts procedure—we could write an-
Turing complete (can simulate and be sal machines could compute anything, other procedure, call it contrarian(),
simulated by any other Turing com- only that they could compute anything that calls it as a subroutine:

12 X R D S Ł     
 Ť Ţ ţ Ť  Ł     ĩ ţ Ū  Ł   ĩ ť

Ian Horswill, “What is Computation?.” XRDS, March 2012. Copyright Association for Computing Machinery. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://xrds.acm.org/article.cfm?aid=2090283.
2 WHAT IS COMPUTATION? 8

void contrarian(int input) { can solve it a lot of the time, but we also COMPUTATIONAL NEUROSCIENCE
if (halts(contrarian, input)) get it wrong sometimes. We started with the idea of computation
while (TRUE) { /* loop infinitely */ } being a process that humans perform
} IMITATION, EQUIVALENCE, AND in their brains, and then looked at how
INTELLIGENCE specific instances of that process could
But notice that contrarian is asking There’s an old party game, called “the be modeled at a coarse level by mechani-
halts whether it (contrarian) will halt it- imitation game,” in which two people— cal processes. That led us eventually to
self. And being contrarian, it then does usually a man and a woman—hide in both the limits of mechanical proce-
exactly the opposite. So no matter what different rooms while the other guests dures, and the claim that it was none-
halts returns, it will be wrong by defini- try to determine who is whom by sub- theless theoretically possible for a ma-
tion; if halts() says it will halt, contrar- mitting written questions and receiv- chine to be intelligent. Conversely, it’s
ian runs the infinite while loop. And if ing written answers. The idea is to see become common in our culture to talk
it says it will hang, contrarian returns whether the hiders can fool the rest of about the brain as being a kind of com-
immediately. the guests. In the terminology we’ve puter. At this point, you may object, “I
The fact we can write a four line C used above, the people in the rooms don’t feel like a computer.” So let’s talk
program to break any proposed solu- are trying to act behaviorally equiva- about what it might mean to say that the
tion to the halting problem means lent to one another. Obviously, this brain is a kind of computer. Certainly,
that the halting problem must be un- doesn’t mean that if the impersonators the brain can do computation. But that
computable. This proof, or rather, a win they’ve actually changed identities doesn’t mean if you cut open someone’s
much more rigorous version of it, was or sexes. (That is, sex in the biological skull you’re going to see something
due to Turing. It’s important because sense. One might argue that they’ve that’s structurally similar to a lap-
it shows that: temporarily changed their socially de- top or a Turing machine. But as we’ve
fined gender identities.) seen, computation is all about behav-
šThere are problems that are un- But imagine we play the game not ioral equivalence. So the real question
computable by Turing machines, with two people, but with one person is could a brain and a PC, in principle,
and so by any mechanical system and one computer. What if the com- simulate one another? One side is obvi-
we’ve ever been able to devise. puter could fool people into thinking it ous. A person can simulate a PC, by writ-
šMehi[ o[j" j^[o _dYbkZ[ fheXb[ci was human? In an important 1950 pa- ing down the contents of the computer’s
we actually care about. per, “Computing Machinery and Intel- memory on (a whole lot of) scratch pa-
šKbj_cWj[bo"j^[[n_ij[dY[e\kdYec- ligence,” Turing argued if a computer per and then manually executing the
putable problems is due to the very could fool humans into thinking it was instructions in its program, one at a
power of general-purpose compu- human, then it would have to be con- time. It would be incredibly boring, but
tation and, specifically, to the ca- sidered to be intelligent even though it would be conceptually possible. So the
pacity for meta-computation. it wasn’t actually human [3]. In other real question is whether a sufficiently
words, intelligence is ultimately a be- big PC could simulate the human brain.
However, the uncomputability of havioral phenomenon [4]. That is, an The brain is a network of roughly
the halting problem is often misun- entity is intelligent because it behaves 100 billion cells called neurons, to-
derstood, so let’s be very clear on what intelligently, not because it’s com- gether with other tissues that help the
it does and doesn’t entail. It doesn’t posed of some special substance such neurons function. To a first approxima-
mean we can never determine if a pro- as living tissue or a soul. (Note that this tion, each neuron has a set of inputs,
gram halts; in fact, we can solve the isn’t an argument as to whether people called dendrites, which receive signals
halting problem for many of the pro- have souls or not, simply that it’s pos- from neighboring neurons, and a sin-
grams that we care about in real life. sible to be intelligent without one. It’s gle output, the axon, which produces
What we can’t do is write an infallible not a theological claim.) Moreover, a signal based on the cell’s inputs and
program for determining whether an intelligence is a computational phe- internal state. Each neuron’s axon is
arbitrary piece of program text will nomenon, amenable to computational connected to dendrites of many other
halt for an arbitrary input text. Any analysis. neurons. When one neuron stimulates
program we write for the halting prob- Together with cybernetics, and ear- another neuron, it predictably increas-
lem must necessarily get it wrong some lier work on the theory of computation, es or decreases the rate or likelihood of
of the time, even if it generally gets it Turing’s paper set the stage for the de- the second neuron stimulating other
right in the cases we really care about. velopment of artificial intelligence in neurons. If it’s predictable, then it
The halting problem has also been the 1950s and ‘60s. These provided a should be possible to write a computer
used to argue that the brain must not scientific model for the study of mental program that simulates it, and indeed
be a computer because people can tell representations and the processes that there are many computational models
whether programs will halt and com- operate on them, which were then im- of different kinds of neurons. But if
puters cannot. Regardless of whether ported into fields such as psychology each individual neuron can be simu-
or not the brain is best thought of as a and linguistics, leading to the develop- lated computationally, then it should
computer, people are actually just like ment of the field of cognitive science in be possible in principle to simulate the
computers on the halting problem: We the 1970s. whole brain by simulating the individ-

X R D S Ł     
Ť Ţ ţ Ť Ł    ĩ ţ Ū  Ł   ĩ ť 13

Ian Horswill, “What is Computation?.” XRDS, March 2012. Copyright Association for Computing Machinery. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://xrds.acm.org/article.cfm?aid=2090283.
2 WHAT IS COMPUTATION? 9

ual neurons and connecting the simu- Turing argued if technology? Do we really want to
lations together. make airplanes that are controlled
While there’s a difference between a computer could by computers, so that if program
“should be possible” and “is actually fool humans into crashes, the plane does too? Do
practical,” this is the general idea be- databases and surveillance tech-
hind the claim that we can understand thinking it was nology give governments and cor-
the brain computationally. Assuming human, then it porations too much power?
it’s right, it has some important con- š>emYWdm[ki[_d\ehcWj_edj[Y^-
sequences. If computers can simulate would have to be nology to improve people’s lives?
brains (and by similar reasoning, hu- considered to be
mans in general), then they can solve Computation is a broad, rich field.
any problem humans can solve, if only intelligent even It has had deep influences on our lives
by simulating a human. But since we though it wasn’t and culture. If your PC, cell phone, and
know that computers can’t solve cer- Web access suddenly disappeared, you
tain problems (the uncomputable prob- actually human. would probably have to radically recon-
lems), that would mean that humans figure your life, even though these have
can’t solve uncomputable problems ei- only been widely available in the last 15
ther. In other words, it imposes a funda- years. It’s unlikely that the changes to
mental limit on human knowledge. begs the question of what we mean by society are going to stop any time soon.
Although we’re a long way from being information. By better understanding computation,
able to fully simulate a brain, computa- A pragmatic definition would be we can help make sure those changes
tional neuroscience—in which scien- that computation is what (modern, are for the better.
tists try to understand neural systems digital) computers do, so a system is
as computational processes—is an im- “computational” if ideas from com- Biography

portant and growing area of biological puters are useful for understanding Ian Horswill is an associate professor of computer
science at Northwestern University. He is a member
research. By modeling neural systems it. This is probably the closest defini- of the Department of Electrical Engineering and
as computational systems, we can bet- tion to how real people use the term in Computer Science, where he is Director of the Division
of Graphics and Interactive Media, and was cofounder
ter understand their function. And in practice. As we’ve seen, there are a lot of Northwestern’s Animate Arts Program. His research
some experimental treatments, such as of different kinds of systems that are interests include interactive entertainment technologies,
and cognitive modeling for virtual characters, particularly
cochlear implants, we can actually re- computational under this view. Com- modeling of emotion and personality. He received his Ph.D.
in computer science from the Massachusetts Institute of
place damaged components with com- putation is then a set of metaphors, a Technology in 1993. He has been the chair of the standing
putational systems that are behaviorally lens through which we can view and committee of the Association for the Advancement of
Artificial Intelligence’s Fall and Spring Symposium Series,
equivalent to the biological tissue. describe other phenomena. as well as the 2009 International Conference on the
But that isn’t a very satisfying defi- Foundations of Digital Games.
SO WHAT IS COMPUTATION? nition. Another view would be that
Computation is an idea in flux. Our computation is wrapped up with the References

culture is in the process of renegotiat- study of behavioral equivalence. Under [1] Turing, A. On computable numbers, with an application
to the Entscheidungsproblem. In P roceedings of the
ing what it thinks the concepts com- this view, computation is the process London Mathematical Society, Series 2, 42 (1936),
putation and computer really mean. of producing some desired behavior 230-265. Note that Turing machines were more
a conceptual design than a practical engineering
Computation lies on a conceptual fault without prejudice as to whether it is design. Although Turing did work on the design of
actual working hardware, his work on Turing machines
line where small changes can have ma- implemented through silicon, neu- came before the construction of real computers was
jor consequences to how we view the rons, or clockwork. practical.
world. That makes it a very interesting Whatever definition we adopt, it’s [2] Minsky and Blum proved in the 1960s that a “two-
counter machine” was Turing complete. A two-counter
field to follow right now. clear that our society is undergoing machine is a machine whose only data representation
It’s an interesting exercise to type profound changes as a result of both is a pair of numbers (non-negative integers, in fact),
and whose only commands are to add or subtract 1
“define computation” into Google and computational technology and com- from one of the numbers and to check whether one of
look at the definitions you get. Search putational metaphors. These raise a them was zero.

results include “determining some- number of psychological and social is- [3] Turing, A. Computing machinery and intelligence.
Originally published by Oxford University Press on
thing by mathematical or logical meth- sues we need to think about: behalf of MIND (the Journal of the Mind Association)
ods,” which doesn’t apply well to the 59, 236 (1959), 433-60; http://www.abelard.org/
turpap/turpap.htm
idea of DNA being a computer program, šWhat kinds of computational sys-
[4] Although widely accepted, the computational view is
or “finding a solution to a problem from tems are easy for people to use? not universally accepted. See for example, Searle, J.
given inputs by means of an algorithm,” š>em YWd m[ Z[i_]d ioij[ci j^Wj R. Minds, brains, and programs. Behavioral and Brain
Sciences 3, 3 (1980), 417-457; http://www.bbsonline.
which is essentially the functional mod- people find more rewarding and org/Preprints/OldArchive/bbs.searle2.html
el that, as we saw, doesn’t apply well to engaging?
things like computer games or anti-lock š>em YWd m[ Z[i_]d bWh][ ioij[ci
brake systems. Another possible an- that are easy for humans to under-
swer is that computation is “informa- stand?
tion processing,” although that simply šM^WjWh[j^[h_iaie\_d\ehcWj_ed © 2012 ACM 1528-4972/12/03 $10.00

14 X R D S Ł     
 Ť Ţ ţ Ť  Ł     ĩ ţ Ū  Ł   ĩ ť

Ian Horswill, “What is Computation?.” XRDS, March 2012. Copyright Association for Computing Machinery. Article provided by Library Reserves for private
study, scholarship, or research. Do not redistribute. This article can also be found at http://xrds.acm.org/article.cfm?aid=2090283.
33 COMPUTATIONAL THINKING 10

Viewpoint Jeannette M. Wing

Computational Thinking
It represents a universally applicable attitude and skill set everyone, not just
computer scientists, would be eager to learn and use.
omputational thinking cisely. Stating the difficulty of a problem accounts

C builds on the power and


limits of computing
processes, whether they are exe-
for the underlying power of the machine—the com-
puting device that will run the solution. We must
consider the machine’s instruction set, its resource
cuted by a human or by a constraints, and its operating environment.
machine. Computational In solving a problem efficiently,, we might further
methods and models give us ask whether an approximate solution is good
the courage to solve prob- enough, whether we can use randomization to our
lems and design systems that no one of us would advantage, and whether false positives or false nega-
be capable of tackling alone. Computational think- tives are allowed. Computational thinking is refor-
ing confronts the riddle of machine intelligence: mulating a seemingly difficult problem into one we
What can humans do better than computers? and know how to solve, perhaps by reduction, embed-
What can computers do better than humans? Most ding, transformation, or simulation.
fundamentally it addresses the question: What is Computational thinking is thinking recursively. It
computable? Today, we know only parts of the is parallel processing. It is interpreting code as data
answers to such questions. and data as code. It is type checking as the general-
Computational thinking is a fundamental skill for ization of dimensional analysis. It is recognizing
everyone, not just for computer scientists. To read- both the virtues and the dangers of aliasing, or giv-
ing, writing, and arithmetic, we should add compu- ing someone or something more than one name. It
tational thinking to every child’s analytical ability. is recognizing both the cost and power of indirect
Just as the printing press facilitated the spread of the addressing and procedure call. It is judging a pro-
three Rs, what is appropriately incestuous about this gram not just for correctness and efficiency but for
vision is that computing and computers facilitate the aesthetics, and a system’s design for simplicity and
spread of computational thinking. elegance.
Computational thinking involves solving prob- Computational thinking is using abstraction and
lems, designing systems, and understanding human decomposition when attacking a large complex task
behavior, by drawing on the concepts fundamental or designing a large complex system. It is separation
to computer science. Computational thinking of concerns. It is choosing an appropriate representa-
includes a range of mental tools that reflect the tion for a problem or modeling the relevant aspects
breadth of the field of computer science. of a problem to make it tractable. It is using invari-
Having to solve a particular problem, we might ants to describe a system’s behavior succinctly and
ask: How difficult is it to solve? and What’s the best declaratively. It is having the confidence we can
LISA HANEY

way to solve it? Computer science rests on solid the- safely use, modify, and influence a large complex
oretical underpinnings to answer such questions pre- system without understanding its every detail. It is

COMMUNICATIONS OF THE ACM March 2006/Vol. 49, No. 3 33

Jeannette Wing, “Computational Thinking.” CACM, March 2006. Copyright Association for Computing Machinery. Article provided by Library Reserves for
private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.cs.cmu.edu/~wing/publications/Wing06.pdf.
3 COMPUTATIONAL THINKING 11

Viewpoint

modularizing something in anticipation of multiple ulary; when nondeterminism and garbage collection
users or prefetching and caching in anticipation of take on the meanings used by computer scientists;
future use. and when trees are drawn upside down.
Computational thinking is thinking in terms of We have witnessed the influence of computa-
prevention, protection, and recovery from worst-case tional thinking on other disciplines. For example,
scenarios through redundancy, damage containment, machine learning has transformed statistics. Statisti-
and error correction. It is calling gridlock deadlock cal learning is being used for problems on a scale, in
and contracts interfaces. It is learning to avoid race terms of both data size and dimension, unimagin-
conditions when synchronizing meetings with one able only a few years ago. Statistics departments in
another. all kinds of organizations are hiring computer scien-
Computational thinking is using heuristic reason- tists. Schools of computer science are embracing
ing to discover a solution. It is planning, learning, existing or starting up new statistics departments.
and scheduling in the presence of uncertainty. It is Computer scientists’ recent interest in biology is
search, search, and more search, resulting in a list of driven by their belief that biologists can benefit

Thinking like a computer scientist means more than being able to


program a computer. It requires thinking at multiple levels of abstraction.
Web pages, a strategy for winning a game, or a coun- from computational thinking. Computer science’s
terexample. Computational thinking is using massive contribution to biology goes beyond the ability to
amounts of data to speed up computation. It is mak- search through vast amounts of sequence data look-
ing trade-offs between time and space and between ing for patterns. The hope is that data structures
processing power and storage capacity. and algorithms—our computational abstractions
Consider these everyday examples: When your and methods—can represent the structure of pro-
daughter goes to school in the morning, she puts in teins in ways that elucidate their function. Compu-
her backpack the things she needs for the day; that’s tational biology is changing the way biologists
prefetching and caching. When your son loses his think. Similarly, computational game theory is
mittens, you suggest he retrace his steps; that’s back- changing the way economists think; nanocomput-
tracking. At what point do you stop renting skis and ing, the way chemists think; and quantum comput-
buy yourself a pair?; that’s online algorithms. Which ing, the way physicists think.
line do you stand in at the supermarket?; that’s per- This kind of thinking will be part of the skill set
formance modeling for multi-server systems. Why of not only other scientists but of everyone else.
does your telephone still work during a power out- Ubiquitous computing is to today as computational
age?; that’s independence of failure and redundancy thinking is to tomorrow. Ubiquitous computing was
in design. How do Completely Automated Public yesterday’s dream that became today’s reality; com-
Turing Test(s) to Tell Computers and Humans putational thinking is tomorrow’s reality.
Apart, or CAPTCHAs, authenticate humans?; that’s
exploiting the difficulty of solving hard AI problems WHAT IT IS, AND ISN’T
to foil computing agents. Computer science is the study of computation—
Computational thinking will have become what can be computed and how to compute it.
ingrained in everyone’s lives when words like algo- Computational thinking thus has the following
rithm and precondition are part of everyone’s vocab- characteristics:

34 March 2006/Vol. 49, No. 3 COMMUNICATIONS OF THE ACM

Jeannette Wing, “Computational Thinking.” CACM, March 2006. Copyright Association for Computing Machinery. Article provided by Library Reserves for
private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.cs.cmu.edu/~wing/publications/Wing06.pdf.
3 COMPUTATIONAL THINKING 12

Conceptualizing, not programming. Computer sci- Many people equate computer science with com-
ence is not computer programming. Thinking puter programming. Some parents see only a narrow
like a computer scientist means more than being range of job opportunities for their children who
able to program a computer. It requires thinking major in computer science. Many people think the
at multiple levels of abstraction; fundamental research in computer science is done
Fundamental, not rote skill. A fundamental skill is and that only the engineering remains. Computa-
something every human being must know to tional thinking is a grand vision to guide computer
function in modern society. Rote means a science educators, researchers, and practitioners as we
mechanical routine. Ironically, not until computer act to change society’s image of the field. We espe-
science solves the AI Grand Challenge of making cially need to reach the pre-college audience, includ-
computers think like humans will thinking be ing teachers, parents, and students, sending them
rote; two main messages:
A way that humans, not computers, think. Computa-
tional thinking is a way humans solve problems; Intellectually challenging and engaging scientific prob-
it is not trying to get humans to think like com- lems remain to be understood and solved. The prob-
puters. Computers are dull and boring; humans lem domain and solution domain are limited only
are clever and imaginative. We humans make by our own curiosity and creativity; and
computers exciting. Equipped with computing One can major in computer science and do anything.
devices, we use our cleverness to tackle problems One can major in English or mathematics and go
we would not dare take on before the age of com- on to a multitude of different careers. Ditto com-
puting and build systems with functionality lim- puter science. One can major in computer science
ited only by our imaginations; and go on to a career in medicine, law, business,
Complements and combines mathematical and engi- politics, any type of science or engineering, and
neering thinking. Computer science inherently even the arts.
draws on mathematical thinking, given that, like
all sciences, its formal foundations rest on mathe- Professors of computer science should teach a
matics. Computer science inherently draws on course called “Ways to Think Like a Computer Sci-
engineering thinking, given that we build systems entist” to college freshmen, making it available to
that interact with the real world. The constraints non-majors, not just to computer science majors. We
of the underlying computing device force com- should expose pre-college students to computational
puter scientists to think computationally, not just methods and models. Rather than bemoan the
mathematically. Being free to build virtual worlds decline of interest in computer science or the decline
enables us to engineer systems beyond the physi- in funding for research in computer science, we
cal world; should look to inspire the public’s interest in the
Ideas, not artifacts. It’s not just the software and intellectual adventure of the field. We’ll thus spread
hardware artifacts we produce that will be physi- the joy, awe, and power of computer science, aiming
cally present everywhere and touch our lives all to make computational thinking commonplace. c
the time, it will be the computational concepts
we use to approach and solve problems, manage Jeannette M. Wing (wing@cs.cmu.edu) is the President’s
our daily lives, and communicate and interact Professor of Computer Science in and head of the Computer Science
with other people; and Department at Carnegie Mellon University, Pittsburgh, PA.
For everyone, everywhere. Computational thinking
will be a reality when it is so integral to human
endeavors it disappears as an explicit philosophy. © 2006 ACM 0001-0782/06/0300 $5.00

COMMUNICATIONS OF THE ACM March 2006/Vol. 49, No. 3 35

Jeannette Wing, “Computational Thinking.” CACM, March 2006. Copyright Association for Computing Machinery. Article provided by Library Reserves for
private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.cs.cmu.edu/~wing/publications/Wing06.pdf.
44 THE MANY FACETS OF NATURAL COMPUTING 13

review articles
DOI :1 0 .1 1 45/ 140 0 1 81 .140 0 20 0
applications, as well as biology, chem-
Natural computing builds a bridge between istry, and physics experimental labora-
tory research.
computer science and natural sciences. In this review we describe com-
puting paradigms abstracted from
BY LILA KARI AND GRZEGORZ ROZENBERG natural phenomena as diverse as
self-reproduction, the functioning of

The Many
the brain, Darwinian evolution, group
behavior, the immune system, the char-
acteristics of life, cell membranes, and
morphogenesis. These paradigms can

Facets of
be implemented either on traditional
electronic hardware or on alternative
physical media such as biomolecular
(DNA, RNA) computing, or trapped-ion

Natural
quantum computing devices. Dually,
we describe several natural processes
that can be viewed as information pro-
cessing, such as gene regulatory net-

Computing
works, protein-protein interaction net-
works, biological transport networks,
and gene assembly in unicellular or-
ganisms. In the same vein, we list ef-
forts to understand biological systems
by engineering semi-synthetic organ-
isms, and to understand the universe
from the point of view of information
processing.
This review was written with the ex-
“Biology and computer science—life and pectation that the reader is a computer
scientist with limited knowledge of
computation—are related. I am confident that natural sciences, and it avoids dwell-
at their interface great discoveries await those ing on the minute details of various
natural phenomena. Thus, rather than
who seek them.” being overwhelmed by particulars, it is
— Leonard Adleman, our hope that readers see this article
Scientific American, Aug. 1998 as simply a window into the profound
relationship that exists between nature
and computation.
Natural computing is the field of research that There is information processing in
nature, and the natural sciences are al-
investigates models and computational techniques ready adapting by incorporating tools
inspired by nature and, dually, attempts to under- and concepts from computer science
stand the world around us in terms of information at a rapid pace. Conversely, a closer
look at nature from the point of view
processing. It is a highly interdisciplinary field that of information processing can and will
connects the natural sciences with computing
science, both at the level of information technology The vivid images peppered throughout this
story offer glimpses of what can happen when
and at the level of fundamental research.33 nature, art, and computer science join forces.

As a matter of fact, natural computing areas and While not directly referenced in this article,
these images serve to offer readers some
topics come in many flavors, including pure startling perspectives of nature up close as
only technology can provide.
theoretical research, algorithms and software
72 C O M M UN I C AT I ON S O F T H E AC M | O C TO B E R 2 00 8 | VO L . 51 | NO. 1 0

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 14

Neri Oxman, an architect


and researcher currently
working for her Ph.D. in
design and computation
at MIT, formed an
interdisciplinary
research initiative
called Materialecology
that undertakes
design research in the
intersection between
architecture, engineering,
computation, biology
and ecology. Here, she
illustrates how plants
often grow in fashion to
maximize the surface
area of their branching
geometries while
maintaining structural
support. This work was
done in collaboration
with W. Craig Carter,
a professor in MIT’s
Department of
Material Science and
Engineering. For more
images, see http://www.
materialecology.com/.

change what we mean by computation. John von Neumann, who was trained ternative explanation to the phenome-
Our invitation to you, fellow computer in both mathematics and chemistry, non of emergence of complexity in the
scientists, is to take part in the uncov- investigated cellular automata as a natural world, and used, among others,
ering of this wondrous connection.a framework for the understanding of for modeling in physics and biology.
the behavior of complex systems. In In parallel to early comparisons39
Nature as Inspiration particular, he believed that self-repro- between computing machines and the
Among the oldest examples of nature- duction was a feature essential to both human nervous system, McCulloch and
inspired models of computation are biological organisms and computers.40 Pitts proposed the first model of artifi-
the cellular automata conceived by A cellular automaton is a dynami- cial neurons. This research eventually
Ulam and von Neumann in the 1940s. cal system consisting of a regular grid gave rise to the field of neural computa-
of cells, in which space and time are tion, and it also had a profound influ-
a A few words are in order about the organization discrete. Each of the cells can be in one ence on the foundations of automata
of this article. The classifications and labels of a finite number of states. Each cell theory. The goal of neural computa-
we use for various fields of research are purely
changes its state according to a list of tion was twofold. On one hand, it was
for the purpose of organizing the discourse. In
reality, far from being clear-cut, many of the given transition rules that determine hoped that it would help unravel the
fields of research mentioned here overlap, or its future state, based on its current structure of computation in nervous
fit under more than one category. The general state and the current states of some of systems of living organisms (How does
audience for whom this article is intended, our its neighbors. The entire grid of cells the brain work?). On the other hand, it
respective fields of expertise, and especially
updates its configuration synchro- was predicted that, by using the princi-
the limited space available for this review af-
fected both the depth and breadth of our expo- nously according to the a priori given ples of how the human brain process-
sition. In particular, we did not discuss some transition rules. es information, neural computation
fields of research that have large overlaps with Cellular automata have been ap- would yield significant computational
natural computing, such as bioinformatics, plied to the study of phenomena as advances (How can we build an intel-
computational molecular biology, and their
roles in, for example, genomics and proteom-
diverse as communication, computa- ligent computer?). The first goal has
ics. In addition, our explanations of various tion, construction, growth, reproduc- been pursued mainly within the neu-
aspects, themes, and paradigms had to be tion, competition, and evolution. One rosciences under the name of brain
necessarily oversimplified. As well, the space of the best known examples of cellular theory or computational neuroscience,
we devoted to various fields and topics was automata—the “game of life” invented while the quest for the second goal has
influenced by several factors and, as such, has
no relation to the respective importance of the
by Conway—was shown to be compu- become mainly a computer science
field or the relative size of the body of research tationally universal. Cellular automata discipline known as artificial neural
in that field. have been extensively studied as an al- networks or simply neural networks.5

O C TOBE R 20 0 8 | VO L. 51 | NO. 10 | COM M UN I CATI ONS OF THE ACM 73

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 15

review articles

An artificial neural network consists While Turing and von Neumann environmental selection.
of interconnected artificial neurons.31 dreamed of understanding the brain, Evolutionary systems have first been
Modeled after the natural neurons, and possibly designing an intelligent viewed as optimization processes in the
each artificial neuron A has n real-val- computer that works like the brain, evo- 1930s. The basic idea of viewing evolu-
ued inputs, x1, x2, …, xn, and it computes lutionary computation6 emerged as an- tion as a computational process gained
its own primitive function fA as follows. other computation paradigm that drew momentum in the 1960s, and evolved
Usually, the inputs have associated its inspiration from a completely dif- along three main branches.13 Evolution
weights, w1, w2, …, wn. Upon receiving ferent part of biology: Darwinian evolu- strategies use evolutionary processes
the n inputs, the artificial neuron A tion. Rather than emulating features of to solve parameter optimization prob-
produces the output fA(w1x1 + w2x2 + … a single biological organism, evolution- lems, and are today used for real-val-
+ wnxn). An artificial neural network is ary computation draws its inspiration ued as well as discrete and mixed types
a network of such neurons, and thus from the dynamics of an entire species of parameters. Evolutionary program-
a network of their respective primitive of organisms. An artificial evolution- ming originally aimed at achieving the
functions. Some neurons are selected to ary system is a computational system goals of artificial intelligence via evo-
be the output neurons, and the network based on the notion of simulated evo- lutionary techniques, namely by evolv-
function is a vectorial function that, for lution. It features a constant- or vari- ing populations of intelligent agents
n input values, associates the outputs of able-size population of individuals, a modeled, for example, as finite-state
the m output neurons. Note that differ- fitness criterion according to which the machines. Today, these algorithms
ent selections of the weights produce individuals of the population are being are also often used for real-valued pa-
rameter optimization problems. Ge-
netic algorithms originally featured a
From Archimorph, population of individuals encoded as
where work is
fixed-length bit strings, wherein muta-
continuing on their
L-System and tions consisted of bit-flips according
Evolutionary to a typically small, uniform mutation
Algorithm, including rate, the recombination of two parents
new images of
L-Systems growths consisted of a cut-and-paste of a prefix
as well as diagrams of one parent with a suffix of the other,
explaining the process and the fitness function was problem-
of the overall design. dependent. If the initial individuals
For more images,
see archimorph. were to encode possible solutions to
wordpress.com/. a given problem, and the fitness func-
tion were designed to measure the op-
timality of a candidate solution, then
such a system would, in time, evolve
to produce a near-optimal solution to
the initial problem. Today, genetic al-
gorithms are also modified heavily for
different network functions for the evaluated, and genetically inspired op- applications to real-valued parameter
same inputs. Based on given input-out- erators that produce the next genera- optimization problems as well as many
put pairs, the network can “learn” the tion from the current one. In an evolu- types of combinatorial tasks such as,
weights w1, …, wn. Thus, there are three tionary system, the initial population of for example, permutation-based prob-
important features of any artificial neu- individuals is generated at random or lems. As another application, if the
ral network: the primitive function of heuristically. At each evolutionary step, individuals were computer programs,
each neuron, the topology of the net- the individuals are evaluated according then the genetic algorithm technique
work, and the learning algorithm used to a given fitness function. To form the would result in “the fittest” computer
to find the weights of the network. One next generation, offspring are first gen- programs, as is the goal of genetic pro-
of the many examples of such learning erated from selected individuals by us- gramming.22
algorithms is the “backwards propaga- ing operators such as mutation of a par- Cellular automata, neural compu-
tion of errors.” Back-propagation is a ent, or recombination of pairs or larger tation, and evolutionary computation
supervised learning method by which subsets of parents. The choice of par- are the most established “classical”
the weights of the connections in the ents for recombination can be guided areas of natural computing. Several
network are repeatedly adjusted so as by a fitness-based selection operator, other bio-inspired paradigms emerged
to minimize the difference between the thus reflecting the biological principle more recently, among them swarm in-
actual output vector of the net and the of mate selection. Secondly, individu- telligence, artificial immune systems,
desired output vector. Artificial neural als of the next generation are selected artificial life, membrane computing,
networks have proved to be a fruitful from the set of newly created offspring, and amorphous computing.
paradigm, leading to successful novel sometimes also including the old par- A computational paradigm strad-
applications in both new and estab- ents, according to their fitness—a pro- dling at times evolutionary computa-
lished application areas. cess reflecting the biological concept of tion and neural computation is swarm

74 C O M M UN I C AT I O N S O F T H E AC M | O C TO B E R 2 00 8 | VO L . 51 | NO. 10

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 16

review articles

intelligence.16 A swarm is a group of mo- by laying a pheromone trail on the way


bile biological organisms (such as bac- back to the nest if they found food, and
teria, ants, termites, bees, spiders, fish, following the concentration of phero-
birds) wherein each individual com- mones in the environment if they are
municates with others either directly or
indirectly by acting on its local environ- A closer look looking for food. This foraging behav-
ior has inspired a large number of ant
ment. These interactions contribute to
distributive collective problem solving.
at nature from algorithms used to solve mainly com-

the point of view


binatorial optimization problems de-
Swarm intelligence, sometimes re- fined over discrete search spaces.
ferred to as collective intelligence, is de-
fined as the problem-solving behavior
of information Artificial immune systems are compu-
tational systems devised starting in the
that emerges from the interaction of processing can late 1980s and early 1990s as computa-
such a collection of individual agents.
For example, in research simulating
and will change tionally interesting abstractions of the
natural immune system of biological
flocking behavior, each individual was what we mean by organisms. Viewed as an information
endowed with three simple possible
behaviors: to act as to avoid collision, computation. Our processing system, the immune sys-
tem performs many complex computa-
to match velocity with neighbors, and invitation to you, tions in a highly parallel and distribut-
to stay close to nearby flock mates. The
simulations showed that flocking was fellow computer ed fashion.11 It uses learning, memory,
associative retrieval, and other mecha-
an emergent behavior that arose from
the interaction of these simple rules.
scientists, is to nisms to solve recognition and classi-
fication problems such as distinction
Particle swarm optimization was in- take part in the between self and nonself cells, and
troduced as a new approach to optimi-
zation that had developed from simple
uncovering of neutralization of nonself pathogenic
agents. Indeed, the natural immune
models of social interactions, as well as this wondrous system has sometimes been called the
of flocking behavior in birds and other
organisms. A particle swarm optimiza- connection. “second brain” because of its powerful
information processing capabilities.
tion algorithm starts with a swarm of The natural immune system’s main
“particles,” each representing a poten- function is to protect our bodies against
tial solution to a problem, similar to the constant attack of external patho-
the population of individuals in evolu- gens (viruses, bacteria, fungi, and para-
tionary computation. sites). The main role of the immune
Particles move through a multidi- system is to recognize cells in the body
mensional search space and their po- and categorize them as self or nonself.12
sitions are updated according to their There are two parts of the immune sys-
own experience and that of their neigh- tem: innate (non-specific) and adaptive
bors, by adding “velocity” to their cur- (acquired). The cells of the innate im-
rent positions. The velocity of a particle mune system are immediately avail-
depends on its previous velocity (the able to combat against a wide variety
“inertia” component), the tendency of antigens, without requiring previous
towards the past personal best posi- exposure to them. These cells possess
tion (the cognitive, “nostalgia” compo- the ability of ingesting and digesting
nent), and the move toward a global or several “known” pathogens. In con-
local neighborhood best (the “social” trast, the adaptive immune response
component). The cumulative effect is is the antibody production in response
that each particle converges towards a to a specific new infectious agent. Our
point between the global best and its body maintains a large “combinatorial
personal best. Particle Swarm Optimi- database” of immune cells that circu-
zation algorithms have been used to late throughout the body. When a for-
solve various optimization problems, eign antigen invades the body, only a
and have been applied to unsupervised few of these immune cells can detect
learning, game learning, scheduling the invaders and physically bind to
and planning applications, and design them. This detection triggers the pri-
applications. mary immune response: the genera-
Ant algorithms were introduced to tion of a large population of cells that
model the foraging behavior of ant produce matching antibodies that aid
colonies. In finding the best path be- in the destruction or neutralization of
tween their nest and a source of food, the antigen. The immune system also
ants rely on indirect communication retains some of these specific-anti-

O C TO BE R 2 0 0 8 | VOL . 51 | N O. 10 | COM M UN I CATI ON S OF TH E ACM 75

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 17

review articles

body-producing cells in immunologi- ample was the design36 of evolving vir-


cal memory, so that any subsequent tual block creatures that were selected
exposure to a similar antigen can lead for their ability to swim (or walk, or
to a rapid, and thus more effective, im- jump), and that competed for a com-
mune response (secondary response).
The computational aspects of the While artificial mon resource (controlling a cube) in
a physically simulated world endowed
immune system, such as distinguish-
ing of self from nonself, feature extrac-
immune systems with realistic features such as kinemat-
ics, dynamics, gravity, collisions, and
tion, learning, memory, self-regulation, constitute an friction. The result was that creatures
and fault tolerance, have been exploit-
ed in the design of artificial immune
example of a evolved which would extend arms to-
wards the cube, while others would
systems that have been successfully computational crawl or roll to reach it, and some even
used in applications. The applications
are varied and include computer virus
paradigm inspired developed legs that they used to walk
towards the cube. These ideas were
detection, anomaly detection in a time by a very specific taken one step further25 by combining
series of data, fault diagnosis, pattern
recognition, machine learning, bioin- subsystem of the computational and experimental
approaches, and using rapid manufac-
formatics, optimization, robotics, and a biological turing technology to fabricate physical
control. Recent research in immunol-
ogy departs from the self-nonself dis- organism, artificial robots that were materializations of
their virtually evolved computational
crimination model to develop what is
known as the “danger theory,” wherein
life attempts to counterparts. In spite of the simplic-
ity of the task at hand (horizontal lo-
it is believed that the immune system understand the very comotion), surprisingly different and
differentiates between dangerous and
non-dangerous entities, regardless of
essence of what it complex robots evolved: many of them
exhibited symmetry, some moved side-
whether they belong to self or to non- means to be alive. ways in a crab-like fashion, and others
self. These ideas have started to be ex- crawled on two evolved limbs. This
ploited in artificial immune systems in marked the emergence of mechanical
the context of computer security. artificial life, while the nascent field
While artificial immune systems of synthetic biology, discussed later,
(a.k.a. immunological computation, explores a biological implementation
immunocomputing) constitute an ex- of similar ideas. At the same time,
ample of a computational paradigm the field of Artificial Life continues to
inspired by a very specific subsystem explore directions such as artificial
of a biological organism, artificial life chemistry (abstractions of natural mo-
takes the opposite approach. Artificial lecular processes), as well as tradition-
life (ALife) attempts to understand the ally biological phenomena in artificial
very essence of what it means to be systems, ranging from computational
alive by building ab initio, within in processes such as co-evolutionary ad-
silico computers and other “artificial” aptation and development, to physical
media, artificial systems that exhibit processes such as growth, self-replica-
properties normally associated only tion, and self-repair.
with living organisms.24 Lindenmayer Membrane computing investigates
systems (L-systems), introduced in 1968, computing models abstracted from
can be considered as an early example the structure and the functioning of
of artificial life. living cells, as well as from the way the
L-systems are parallel rewriting sys- cells are organized in tissues or higher
tems that, starting with an initial word, order structures.26 More specifically,
proceed by applying rewriting rules in the feature of the living cells that is
parallel to all the letters of the word, abstracted by membrane computing
and thus generate new words.34 They is their compartmentalized internal
have been most famously used to mod- structure effected by membranes. A
el plant growth and development,29 but generic membrane system is essen-
also for modeling the morphology of tially a nested hierarchical structure
other organisms. of cell-like compartments or regions,
Building on the ideas of evolution- delimited by “membranes.” The entire
ary computation, other pioneers of ar- system is enclosed in an external mem-
tificial life experimented with evolving brane, called the skin membrane, and
populations of “artificial creatures” everything outside the skin membrane
in simulated environments.9 One ex- is considered to be the environment.

76 CO MM U N I CATI O NS O F T H E AC M | O C TO B E R 2 00 8 | VO L . 5 1 | N O. 1 0

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 18

review articles

Each membrane-enveloped region con- ent computational behaviors from the cally different type of “hardware.” This
tains objects and transformation rules interaction of large quantities of such category includes molecular comput-
which modify these objects, as well as unreliable computational particles in- ing and quantum computing.b
specify whether they will be transferred terconnected in unknown, irregular, Molecular computing (known also
outside or stay inside the region. The and time-varying ways. At the same as biomolecular computing, biocom-
transfer thus provides for communica- time, the emphasis is on devising new puting, biochemical computing, DNA
tion between regions. Various formal programming abstractions that would computing), is based on the idea that
mechanisms were developed that re- work well for amorphous computing data can be encoded as biomolecules —
flect the selective manner in which bio- environments. Amorphous computing such as DNA strands — and molecular
logical membranes allow molecules to has been used both as a programming biology tools can be used to transform
pass through them. paradigm using traditional hardware, this data to perform, for example, arith-
Another biologically inspired fea- and as the basis for “cellular comput- metic or logic operations. The birth of
ture of membrane systems as math- ing,” discussed later, under the topics this field was the 1994 breakthrough
ematical constructs is the fact that, synthetic biology, and computation in experiment by Leonard Adleman who
instead of dealing with sets of objects, living cells. solved a small instance of the Hamil-
one uses multisets wherein one keeps tonian Path Problem solely by manipu-
track of the multiplicity of each ob- Nature as Implementation lating DNA strands in test tubes.2
ject. The computational behavior of a Substrate DNA (deoxyribonucleic acid) is a
membrane system starts with an initial In the preceding section we saw cel- linear chain made up of four different
input configuration and proceeds in a lular automata inspired by self-repro- types of nucleotides, each consisting
maximally parallel manner by the non- duction, neural computation by the of a base (Adenine, Cytosine, Guanine,
deterministic choice of application functioning of the brain, evolutionary or Thymine) and a sugar-phosphate
of the transformation rules, as well as computation by the Darwinian evolu- unit. The sugar-phosphate units are
of the objects to which they are to be tion of species, swarm intelligence by linked together by covalent bonds to
applied. The output of the computa- the behavior of groups of organisms,
tion is then collected from an a priori artificial immune systems by the natu- b There are several research areas that, because
determined output membrane. Next ral immune system, artificial life by of the limited space, we could not discuss
to the basic features indicated previ- properties of life in general, membrane here. Thus, for example, non-classical, uncon-
ously, many alternatives of membrane computing by the compartmentalized ventional computation38 focuses on carefully
examining and possibly breaking the classi-
systems have been considered, among organization of the cells, and amor- cal (Turing, von Neumann) computation as-
them ones that allow for membranes to phous computing by morphogenesis. sumptions, and developing a more general
be dissolved and created. Typical appli- All these are computational techniques science of computation. A substantial part of
cations of membrane systems include that, while inspired by nature, have this research is concerned with implementing
biology (modeling photosynthesis and been implemented until now mostly computation on new physical substrates, ex-
ploiting in this way computational properties
certain signaling pathways, quorum on traditional electronic hardware. of various physical, chemical, and biological
sensing in bacteria, modeling cell-me- An entirely distinct category is that of media. A majority of this research is entwined
diated immunity), computer science computing paradigms that use a radi- with, and motivated by, natural computing.
(computer graphics, public-key cryp-
tography, approximation and sorting
algorithms, and solving computation- McGill University’s
Laboratory for Natural
ally hard problems), and linguistics. and Simulated Cognition
Amorphous computing is a paradigm (LNSC) investigates
that draws inspiration from the de- human cognition
velopment of form (morphogenesis) through a combination
of psychological
in biological organisms, wherein in- and computational
teractions of cells guided by a genet- approaches. Using the
ic program give rise to well-defined Cascade-correlation
algorithm, LNSC
shapes and functional structures. researchers created a
Analogously, an amorphous comput- program that outputs
ing medium comprises a multitude of a 2D display of random
irregularly placed, asynchronous, lo- output values of neural
networks. The results
cally interacting computing elements.1 are sometimes quite
These identically programmed “com- phenomenal and
putational particles” communicate artistic. For more, see
www.psych.mcgill.ca/
only with particles situated within a
labs/lnsc/.
small given radius, and may give rise
to certain shapes and patterns such as,
for example, any pre-specified planar
graph. The goal of amorphous com-
puting is to engineer specified coher-

OC TO BER 20 0 8 | VOL . 51 | N O. 10 | COM M U NI CATI ON S OF TH E AC M 77

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 19

review articles

form the backbone of the DNA single RNA. While similar to DNA, RNA dif- gained several new dimensions. One
strand. Since nucleotides may differ fers in three main aspects: RNA is usu- of the most significant achievements
only by their bases, a DNA strand can ally single-stranded while DNA is usu- of molecular computing has been its
be viewed as simply a word over the ally double-stranded, RNA nucleotides contribution to the massive stream of
four-letter alphabet {A,C,G,T}. A DNA contain the sugar ribose, while DNA research in nanosciences, by providing
single strand has an orientation, with nucleotides contain the sugar deoxyri- computational insights into a number
one end known as the 5a end, and the bose, and in RNA the nucleotide Ura- of fundamental issues. Perhaps the
other as the 3a end, based on their cil, U, substitutes for Thymine, which most notable is its contribution to the
chemical properties. By convention, is present in DNA. understanding of self-assembly, which
a word over the DNA alphabet repre- There are many possible DNA bio- is among the key concepts in nanosci-
sents the corresponding DNA single operations that one can use for com- ences.30 Recent experimental research
strand in the 5a to 3a orientation, that putations,21 such as: cut-and-paste into programmable molecular-scale
is, the word GGTTTTT stands for the operations achievable by enzymes, syn- devices has produced impressive self-
DNA single strand 5a– GGTTTTT –3a. A thesizing desired DNA strands up to a assembled DNA nanostructures35 such
crucial feature of DNA single strands is certain length, making exponentially as cubes, octahedra, Sierpinski trian-
their Watson-Crick complementarity: many copies of a DNA strand, and read- gles,32 DNA origami, or intricate nano-
A is complementary to T, G is comple- ing out the sequence of a DNA strand. structures that achieve computation

Paul W.K. Rothemund,


a senior research
associate at California
Institute of Technology,
has developed a method
of creating nanoscale
shapes and patterns
using DNA. The smiley
faces are actually
giant DNA complexes
called “scaffolded DNA
origami.” Rothemund
notes that while the
smiley face shape may
appear silly, there is
serious science behind
it. He hopes to use this
DNA origami (and other
DNA nanotechnologies)
to build smaller, faster
computers and devices.
For more on his work,
visit http://www.dna.
caltech.edu/~pwkr/.

mentary to C, and two complementary These bio-operations and the Watson- such as binary counting, or bit-wise
DNA single strands with opposite ori- Crick complementary binding have cumulative XOR. Other experiments
entation bind to each other by hydro- all been used to control DNA compu- include the construction of DNA-based
gen bonds between their individual tations and DNA robotic operations. logic circuits, and ribozymes that can
bases. In so doing, they form a stable While initial experiments solved simple be used to perform logical operations
DNA double strand resembling a heli- instances of computational problems, and simple computations. In addition,
cal ladder, with the backbones at the more recent experiments tackled suc- an array of ingenious DNA nanoma-
outside and the bound pairs of bases cessfully sophisticated computational chines8 were built with potential uses
lying inside. For example, the DNA sin- problems, such as a 20-variable in- to nanofabrication, engineering, and
gle strand 5a– AAAAACC – 3a will bind stance of the 3-Satisfiability-Problem. computation: molecular switches that
to the DNA single strand 5a– GGTTTTT The efforts toward building an auton- can be driven between two conforma-
– 3a to form the 7 base-pair-long (7bp) omous molecular computer include tions, DNA “tweezers,” DNA “walkers”
double strand implementations of computational that can be moved along a track, and
state transitions with biomolecules, autonomous molecular motors.
5a − AAAAACC − 3a and a DNA implementation of a finite A significant amount of research in
3a − TTTTTGG − 5a automaton with potential applications molecular computing has been dedi-
to the design of smart drugs. cated to the study of theoretical models
Another molecule that can be used More importantly, since 1994, re- of DNA computation and their proper-
for computation is ribonucleic acid, search in molecular computing has ties. The model of DNA computing in-

78 CO M M U N I C AT I ON S OF T H E AC M | O C TO B E R 2 00 8 | VO L. 5 1 | NO. 1 0

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 20

review articles

troduced by Head, based on splicing (a The theoretical results that cata-


combination of cut-and-paste opera- pulted quantum computing to the
tions achievable by enzymes), predates forefront of computing research were
the experimental proof-of-principle of Shor’s quantum algorithms for factor-
DNA computing by almost 10 years.
Subsequently, studies on the compu- It is indeed ing integers and extracting discrete log-
arithms in polynomial time, obtained
tational power of such models proved
that various subsets of bio-operations
believed that one in 1994 — the same year that saw the
first DNA computing experiment by
can achieve the computational power of the possible Adleman. A problem where quantum
of a Turing machine, showing thus that
molecular computers are in principle
contributions of computers were shown to have a qua-
dratic time advantage when compared
possible.27 Overall, molecular comput- computer science to classical computers is quantum da-
ing has created many novel theoretical
questions, and has considerably en-
to biology could be tabase search that can be solved by Gro-
ver’s algorithm. Possible applications
riched the theory of computation. the development of of Shor’s algorithm include breaking
Quantum Computing is another par-
adigm that uses an alternative “hard- a suitable language RSA exponentially faster than an elec-
tronic computer. This joined other ex-
ware” for performing computations.19 to accurately and citing applications, such as quantum
Already in 1980 Benioff introduced
simulations of classical Turing Ma- succinctly describe, teleportation (a technique that trans-
fers a quantum state, but not matter
chines on quantum mechanical sys-
tems. However the idea of a quantum
and reason about, or energy, to an arbitrarily distant loca-
tion), in sustaining the general interest
computer that would run according biological concepts in quantum information processing.
to the laws of quantum physics and
operate exponentially faster than a
and phenomena. So far, the theory of quantum com-
puting has been far more developed
deterministic electronic computer to than the practice. Practical quantum
simulate physics, was first suggested computations use a variety of imple-
by Feynman in 1982. Subsequently, mentation methods such as ion-traps,
Deutsch introduced a formal model superconductors, nuclear magnetic
of quantum computing using a Turing resonance techniques, to name just a
machine formalism, and described a few. To date, the largest quantum com-
universal quantum computer. puting experiment uses liquid state
A quantum computer uses distinc- nuclear magnetic resonance quantum
tively quantum mechanical phenom- information processors that can oper-
ena, such as superposition and en- ate on up to 12 qubits.
tanglement, to perform operations on
data stored as quantum bits (qubits). Nature as Computation
A qubit can hold a 1, a 0, or a quantum The preceding sections describe re-
superposition of these. A quantum search on the theory, applications and
computer operates by manipulating experimental implementations of na-
those qubits with quantum logic gates. ture-inspired computational models
The notion of information is different and techniques. A dual direction of re-
when studied at the quantum level. For search in natural computing is one in
instance, quantum information cannot which the main goal becomes under-
be measured reliably, and any attempt standing nature by viewing processes
at measuring it entails an unavoidable that take place in nature as informa-
and irreversible disturbance. tion processing.
The 1980s saw an abundance of This dual aspect can be seen in sys-
research in quantum information tems biology, and especially in compu-
processing, such as applications to tational systems biology, wherein the
quantum cryptography which, unlike adjective “computational” has two
its classical counterpart, is not usu- meanings. On one hand it means the
ally based on the complexity of com- use of quantitative algorithms for com-
putation but on the special properties putations, or simulations that comple-
of quantum information. Recently an ment experiments in hypothesis gen-
open air experiment was reported in eration and validation. On the other
quantum cryptography (not involv- hand, it means a qualitative approach
ing optical cable) over a distance of that investigates processes taking place
144km, conducted between two Ca- in cells through the prism of commu-
nary islands. nications and interactions, and thus of

O C TO BER 20 0 8 | VO L. 51 | N O. 1 0 | COMM U NI CAT ION S OF TH E ACM 79

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 21

review articles

computations. We shall herein address automata, and network motifs.


mostly the second aspect, whereby sys- Another point of view,20 is that the
tems biology aims to understand the entire genomic regulatory system can
complex interactions in biological sys- be thought of as a computational sys-
tems by using an integrative as opposed
to a reductionist approach. The re- As the natural tem, the “genomic computer.” Such a
perspective has the potential to yield
ductionist approach to biology tries to
identify all the individual components
sciences are rapidly insights into both computation as hu-
mans historically designed it, and com-
of functional processes that take place absorbing ideas putation as it occurs in nature. There
in an organism, in such a way that the
processes and the interactions between
of information are both similarities and significant
differences between the genomic com-
the components can be understood. In processing, and puter and an electronic computer. Both
contrast, systems biology takes a sys-
temic approach in focusing instead on
the meaning of perform computations, the genomic
computer on a much larger scale. How-
the interaction networks themselves, computation is ever, in a genomic computer, molecular
and on the properties of the biological
systems that arise because of these in- changing as it transport and movement of ions through
electrochemical gradients replace wires,
teraction networks. Hence, for exam- embraces concepts causal coordination replaces imposed
ple, at the cell level, scientific research
on organic components has focused from the natural temporal synchrony, changeable ar-
chitecture replaces rigid structure, and
strongly on four different interdepen-
dent interaction networks, based on
sciences, we have communication channels are formed
on an as-needed basis. Both comput-
four different “biochemical toolkits:” the rare privilege ers have a passive memory, but the ge-
nucleic acids (DNA and RNA), proteins,
lipids, carbohydrates, and their build-
to take part in nomic computer does not place it in an
a priori dedicated and rigidly defined
ing blocks (see Cardelli,10 whose cat- several such place; in addition, the genomic com-
egorization we follow here).
The genome consists of DNA se- metamorphoses. puter has a dynamic memory in which,
for example, trancriptional subcircuits
quences, some of which are genes that maintain given regulatory states. In a ge-
can be transcribed into messenger nomic computer robustness is achieved
RNA (mRNA), and then translated into by different means, such as by rigorous
proteins according to the genetic code selection: non (or poorly)-functional
that maps 3-letter DNA segments into processes are rapidly degraded by vari-
amino acids. A protein is a sequence ous feedback mechanisms or, at the cell
over the 20-letter alphabet of amino ac- level, non (or poorly)-functional cells are
ids. Each gene is associated with other rapidly killed by apoptosis, and, at the or-
DNA segments (promoters, enhancers, ganism level, non (or poorly)-functional
or silencers) that act as binding sites organisms are rapidly out-competed
for proteins that activate or repress by more fit species. Finally, in the case
the gene’s transcription. Genes inter- of a genomic computer, the distinction
act with each other indirectly, either between hardware and software breaks
through their gene products (mRNA, down: the genomic DNA provides both
proteins), which can act as transcrip- the hardware and the digital regulatory
tion factors to regulate gene transcrip- code (software).
tion — either as activators or repres- Proteins and their interactions form
sors — or through small RNA species another interaction network in a cell,
that directly regulate genes. that of biochemical networks, which
These gene-gene interactions, to- perform all mechanical and metabolic
gether with the genes’ interactions with tasks inside a cell. Proteins are folded-
other substances in the cell, form the up strings of amino acids that take
most basic interaction network of an three-dimensional shapes, with pos-
organism, the gene regulatory network. sible characteristic interaction sites ac-
Gene regulatory networks perform cessible to other molecules. If the bind-
information processing tasks within ing of interaction sites is energetically
the cell, including the assembly and favorable, two or more proteins may spe-
maintenance of the other networks. cifically bind to each other to form a
Research into modeling gene regu- dynamic protein complex by a process
latory networks includes qualitative called complexation. A protein complex
models such as random and probabi- may act as a catalyst by bringing togeth-
listic Boolean networks, asynchronous er other compounds and facilitating

80 CO M M U N I CAT I O N S O F T H E AC M | O C TO B E R 20 08 | VO L . 51 | N O. 1 0

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 22

review articles

Artist Jonathan
McCabe’s interests
include theories of
biological pattern
formation and evolution
and their application to
computer art. He writes
computer programs
that measure statistical
properties of images
for use in artificial
evolution of computer
art. For more, see www.
jonathanmccabe.com/.

chemical reactions between them. Pro- port of substances, forming transport able to describe all these networks and
teins may also chemically modify each networks. A biological membrane is their interactions. Process calculus has
other by attaching or removing modify- more than a container: it consists of a been proposed for this purpose, but a
ing groups, such as phosphate groups, lipid bilayer in which proteins and oth- generally accepted common language
at specific sites. Each such modification er molecules, such as glycolipids, are to describe these biological phenom-
may reveal new interaction surfaces. embedded. The membrane structural ena is still to be developed and uni-
There are tens of thousands of proteins components, as well as the embedded versally accepted. It is indeed believed
in a cell. At any given moment, each of proteins or glycolipids, can travel along that one of the possible contributions
them has certain available binding sites this lipid bilayer. Proteins can inter- of computer science to biology could
(which means that they can bind to oth- act with free-floating molecules, and be the development of a suitable lan-
er proteins, DNA, or membranes), and some of these interactions trigger sig- guage to accurately and succinctly de-
each of them has modifying groups at nal transduction pathways, leading to scribe, and reason about, biological
specific sites either present or absent. gene transcription. Basic operations concepts and phenomena.18
Protein-protein interaction networks of membranes include fusion of two While systems biology studies
are large and complex, and finding a membranes into one, and fission of a complex biological organisms as inte-
language to describe them is a difficult membrane into two. Other operations grated wholes, synthetic biology is an
task. Significant progress in this direc- involve transport, for example trans- effort to engineer artificial biological
tion was made by the introduction of porting an object to an interior compart- systems from their constituent parts.
Kohn-maps, a graphical notation that ment where it can be degraded. Formal- The mantra of synthetic biology is that
resulted in succinct pictures depict- isms that depict the transport networks one can understand only what one can
ing molecular interactions. Other ap- are few, and include membrane systems construct. Thus, the main focus of syn-
proaches include the textual bio-calcu- described earlier, and brane calculi. thetic biology is to take parts of natu-
lus, or the recent use of existing process The gene regulatory networks, the ral biological systems and use them to
calculi (π-calculus), enriched with sto- protein-protein interaction networks, build an artificial biological system for
chastic features, as the language to de- and the transport networks are all in- the purpose of understanding natural
scribe chemical interactions. terlinked and interdependent. Genes phenomena, or for a variety of possible
Yet another biological interaction code for proteins which, in turn, can applications. In this sense, one can
network, and the last that we discuss regulate the transcription of other make an analogy between synthetic
here, is that of transport networks medi- genes, membranes are separators but biology and computer engineering.3
ated by lipid membranes. Some lipids also embed active proteins in their sur- The history of synthetic biology can
can self-assemble into membranes and faces. Currently there is no single for- be arguably traced back to the discov-
contribute to the separation and trans- mal general framework and notation ery in the 1960s, by Jacob and Monod,

O CTO BER 2 0 08 | VO L. 51 | N O. 1 0 | COM M UN ICATION S OF THE ACM 81

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 23

review articles

of mathematical logic in gene regula- into a Mycoplasma bacterium using a Besides systems biology that tries
tion. Early achievements in genetic technique wherein a whole genome can to understand biological organisms as
engineering using recombinant DNA be transplanted from one species into networks of interactions, and synthet-
technology (the insertion, deletion, another, such that the resulting prog- ic biology that seeks to engineer and
or combination of different segments eny is the same species as the donor ge- build artificial biological systems, an-
of DNA strands) can be viewed as the nome. Counterbalancing objections to other approach to understanding na-
experimental precursors of today’s assembling a semi-synthetic cell with- ture as computation is the research on
synthetic biology, which now extends out fully understanding its functioning, computation in living cells. This is also
these techniques to entire systems of the creation of a functionally and struc- sometimes called cellular computing,
genes and gene products. One goal can turally understood synthetic genome or in vivo computing, and one particular
be constructing specific synthetic bio- was proposed,17 containing 151 genes study in this area is that of the computa-
logical modules such as, for example, (113,000bp) that would produce all the tional capabilities of gene assembly in
pulse generator circuits that display a basic molecular machinery for protein unicellular organisms called ciliates.
transient response to variations in in- synthesis and DNA replication. A third Ciliates possess two copies of their
put stimulus. approach to create a human-made cell DNA: one copy encoding functional
Advances in DNA synthesis of lon- is the one pursued by Szostak and oth- genes, in the macronucleus, and an-
ger and longer strands of DNA are pav- ers, who would construct a single type of other “encrypted” copy in the micro-
ing the way for the construction of RNA-like molecule capable of self-repli- nucleus. In the process of conjugation,
synthetic genomes with the purpose of cating, possibly housed in a single lipid after two ciliates exchange genetic in-
building an entirely artificial organism. membrane. Such molecules can be ob- formation and form new micronuclei,
Progress includes the generation of a tained by guiding the rapid evolution of they use the new micronuclei to as-
5,386bp synthetic genome of a virus, an initial population of RNA-like mol- semble in real-time new macronuclei
by rapid (14-day) assembly of chemi- ecules, by selecting for desired traits. necessary for their survival. This is ac-
cally synthesized short DNA strands.37 Lastly, another effort in synthetic complished by a process that involves
Recently an announcement was made biology is toward engineering multi- re-ordering some fragments of DNA
of the near completion of the assem- cellular systems by designing, for ex- (permutations and possibly inversions),
bly of an entire “minimal genome” of ample, cell-to-cell communication and deleting other fragments from the
a bacterium, Mycoplasma Genitalium.7 modules that could be used to coordi- micronuclear copy. The process of gene
Smith and others indeed found about nate living bacterial cell populations. assembly is fascinating from both the
100 dispensable genes that can be re- Research in synthetic biology faces biological and the computational point
moved individually from the original many challenges, some of them of an of view. From the computational point
genome. They hope to assemble a mini- information processing nature. There of view, this study led to many novel and
mal genome consisting of essential arguably is a pressing need for stan- challenging research themes.14 Among
genes only, that would be still viable but dardization, modularization, and ab- others, it was proved that various mod-
shorter than the 528-gene, 580,000bp straction, to allow focusing on design els of gene assembly have full Turing
genome of M.Genitalium. This human- principles without reference to lower- machine capabilities.23 From the bio-
made genome could then be inserted level details.15 logical point of view, the joint effort of
computer scientists and biologists led
to a plausible hypothesis (supported
European artist Leonel already by some experimental data)
Moura works with
AI and robotics. The about the “bioware” that implements
Swarm Paintings, the process of gene assembly, which is
produced in 2001, were based on the new concept of template-
the result of several guided recombination.4, 28
experiments with
an “Ant Algorithm” Other approaches to cellular com-
where he tried to puting include developing an in vivo
apply virtual emergent programmable and autonomous finite-
pheromone trails to
a real space pictorial
state automaton within E.Coli, and de-
expression. In this case, signing and constructing in vivo cellu-
a computer running lar logic gates and genetic circuits that
an ant algorithm was harness the cell’s existing biochemical
connected to a robotic
arm that “translated” in processes.
pencil or brush strokes At the end of this spectrum of views
the trails generated by of nature as computation, the idea was
the artificial swarm of
ants. For more images,
even advanced by Zuse and Fredkin
see www.leonelmoura. in the 1960s that information is more
com/. fundamental than matter or energy.
The Zuse-Fredkin thesis stated that the
entire universe is some kind of compu-
tational device, namely a huge cellular

82 C OM M U N I C AT I O NS O F T H E AC M | O C TO B E R 2 00 8 | VO L . 5 1 | NO. 1 0

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
4 THE MANY FACETS OF NATURAL COMPUTING 24

review articles

automaton continuously updating its Literature Approach. MIT Press, 2006.


14. Ehrenfeucht, A., Harju, T., Petre, I., Prescott, D., and
rules. Along the same lines, it has been The upper-bound placed on the num- Rozenberg, G. Computation in Living Cells: Gene
recently suggested that the universe is ber of references was a real limitation Assembly in Ciliates. Springer, 2004.
15. Endy, D. Foundations for engineering biology. Nature
a quantum computer that computes it- for this review, since the literature on 438 (2005), 449–453.
self and its own behavior. natural computing is vast. For a more 16. Engelbrecht, A. Fundamentals of Computational
Swarm Intelligence. Wiley and Sons, 2005.
complete list of references the reader 17. Forster, A. and Church, G. Towards synthesis of a
Natural Sciences: Ours to Discover is referred to the full version of this ar- minimal cell. Molecular Systems Biology 2, 45 (Aug.
2006).
Science advances in ever-widening cir- ticle at www.csd.uwo.ca/˜lila/Natural- 18. Fox Keller, E. and Harel, D. Beyond the gene. PLoS
ONE 2, 11 (2007), e1231.
cles of knowledge. Sometimes it metic- Computing-Review.pdf. 19. Hirvensalo, M. Quantum Computing, 2nd Ed. Springer,
ulously crawls. Other times it leaps to a Almost each of the areas we men- 2004.
20. Istrail, S., De-Leon, B-T., and Davidson, E. The
new dimension of understanding and, tioned here has an extensive scien- regulatory genome and the computer. Developmental
in the process, it reinvents itself. As the tific literature as well as a number of Biology 310 (2007), 187–195.
21. Kari, L. DNA computing—the arrival of biological
natural sciences are rapidly absorbing specialized journals and book series. mathematics. The Math. Intelligencer 19, 2 (1997),
ideas of information processing, and There are also journals and book se- 9–22.
22. Koza, J. Genetic Programming: On the Programming of
the meaning of computation is chang- ries aimed at the general natural com- Computers by Means of Natural Selection. MIT Press,
ing as it embraces concepts from the puting community, among them the 1992.
23. Landweber, L. and Kari, L. The evolution of cellular
natural sciences, we have the rare privi- journals Natural Computing, Springer, computing: Nature’s solution to a computational
lege to take part in several such meta- Theoretical Computer Science, Series C: problem. Biosystems 52, 1/3 (1999), 3–13.
24. Langton, C., editor. Artificial Life. Addison-Wesley
morphoses. Theory of Natural Computing, Elsevier, Longman, 1990.
At this moment we and our natural the Natural Computing book series, 25. Lipson, H. and Pollack, J. Automatic design and
manufacture of robotic lifeforms. Nature 406, (2000),
scientist fellows are awash in wave after Springer, and the upcoming Handbook 974–978.
gigantic wave of experimental, especial- of Natural Computing (G. Rozenberg, T. 26. Paun, G. Membrane Computing: An Introduction.
Springer, 2002.
ly biological, data. Just underneath this Bäck, J. Kok, editors, Springer). 27. Paun, G., Rozenberg, G., and Salomaa, A. DNA
Computing: New Computing Paradigms. Springer,
tumultuous surface lie ingenious algo- 1998.
rithms waiting to be designed, elegant Acknowledgments 28. Prescott, D., Ehrenfeucht, A., and Rozenberg, G.
Template guided recombination for IES elimination
theorems waiting to be proven, natural We gratefully acknowledge comments and unscrambling of genes in stichotrichous ciliates. J.
laws waiting to be discovered that will on early drafts of this paper by T. Bäck, Theoretical Biology 222, 3 (2003), 323–330.
29. Prusinkiewicz, P. and Lindenmayer, A. The Algorithmic
put order into chaos. For, as Spinoza D. Bentley, G. Brassard, D. Corne, M. Beauty of Plants. Springer, 1990.
wrote, “nothing happens in nature that Hirvensalo, J. Kari, P. Krishna, H. Lip- 30. Reif, J. and LaBean, T. Autonomous programmable
biomolecular devices using self-assembled DNA
does not follow from her laws.” son, R. Mercer, A. Salomaa, K. Sims, H. nanostructures. Commun. ACM 50, 9 (Sept. 2007),
Conversely, as this review shows, Spaink, J. Timmis, C. Torras, S. Watt, 46–53.
31. Rojas, R. Neural Networks: A Systematic Introduction.
there is an abundance of natural phe- R. Weiss. Springer, 1996.
nomena that can inspire computing This work was supported by NSERC 32. Rothemund, P., Papadakis, N., and Winfree, E.
Algorithmic self-assembly of DNA Sierpinski triangles.
paradigms, alternative physical sub- Discovery Grant and Canada Research PLoS Biology 2, 12 (Dec. 2004).
strates on which to implement compu- Chair Award to L.K., and NSF grant 33. Rozenberg, G. Computer science, informatics and
natural computing—personal reflections. In New
tations, while viewing various natural 0622112 to G.R. Computational Paradigms: Changing Conceptions of
processes as computations has become What Is Computable. Springer, 2008, 373–379.
34. Rozenberg, G. and Salomaa, A. The Mathematical
more and more essential, desirable, Theory of L Systems. Academic Press, 1980.
References
35. Seeman, N. Nanotechnology and the double helix.
and inevitable. All these developments 1. Abelson, H., Allen, D., Coore, D., Hanson, C., Homsy, G.,
Scientific American Reports, 17, 3 (2007), 30–39.
are challenging our assumptions about Knight Jr., T., Nagpal, R., Rauch, E., Sussman, G., and
36. Sims, K. Evolving 3D morphology and behavior by
Weiss, R. Amorphous computing. Commun. ACM 43, 5
competition. In Proceedings of Artificial Life IV. MIT
computation, and indeed, our very def- (May 2000), 74–82.
Press, 1994, 28–39.
2. Adleman, L. Molecular computation of solutions
inition of it. to combinatorial problems. Science 266 (1994),
37. Smith, H., Hutchison III, C., Pfannkoch, C., and Venter,
C. Generating a synthetic genome by whole genome
In these times brimming with ex- 1021–1024.
assembly: IX174 bacteriophage from synthetic
3. Andrianantoandro, E., Basu, S., Karig, D., and Weiss,
citement, our task is nothing less than R. Synthetic biology: new engineering rules for an
oligonucleotides. PNAS 100, 26 (2003), 15440–15445.
38. Stepney, S. et al. Journeys in non-classical
to discover a new, broader, notion of emerging discipline. Molecular Systems Biology 2
computation I: A grand challenge for computing
(2006), 1–14.
computation, and to understand the 4. Angeleska, A., Jonoska, N., Saito, M., and Landweber,
research. Int. J. Parallel, Emergent and Distributed
Systems 20, 1 (2005), 5–19.
world around us in terms of informa- L. RNA-guided DNA assembly. J. Theoretical Biology
39. von Neumann, J. The Computer and the Brain. Yale
248 (2007), 706–720.
tion processing. 5. Arbib, M., editor. The Handbook of Brain Theory and
University Press, 1958.
40. von Neumann, J. Theory of Self-Reproducing
Let us step up to this challenge. Let Neural Networks. MIT Press, 2003.
Automata. U. Illinois Press, 1966. Edited and
6. Bäck, T., Fogel, D., and Michalewicz, Z., editors.
us befriend our fellow the biologist, our completed by A.W.Burks.
Handbook of Evolutionary Computation. IOP
fellow the chemist, our fellow the phys- Publishing, U.K., 1997.
7. Barry, P. Life from scratch: learning to make synthetic
icist, and let us together explore this Lila Kari (lila@csd.uwo.ca) is Professor and Canada
cells. Science News, 173, 2 (2008), 27.
Research Chair in Biocomputing in the Department of
new world. Let us, as computers in the 8. Bath, J. and Turberfield, A. DNA nanomachines.
Computer Science at the University of Western Ontario,
Nature Nanotechnology 2 (May 2007), 275–284
London, Canada.
future will, embrace uncertainty. Let us 9. Brooks, R. Artificial life: From robot dreams to reality.
dare to ask afresh: “What is computa- Nature 406 (2000), 945–947.
Grzegorz Rozenberg (rozenber@liacs.nl) is Professor
10. Cardelli, L. Machines of systems biology. Bulletin of
at the Leiden Institute of Advanced Computer Science,
tion?”, “What is complexity?”, “What the EATCS 93 (2007), 176–204.
Leiden University, Leiden, The Netherlands, and Adjunct
11. Dasgupta, D. editor. Artificial Immune Systems and
are the axioms that define life?” Their Applications. Springer, 1998.
Professor in the Department of Computer Science at the
University of Colorado at Boulder, USA.
Let us relax our hardened ways of 12. de Castro, L. and Timmis, J. Artificial Immune
Systems: A New Computational Intelligence
thinking and, with deference to our sci- Approach. Springer, 2002.
entific forebears, let us begin anew. 13. De Jong, K. Evolutionary Computation: A Unified © 2008 ACM 0001-0782/08/1000 $5.00

O C TO BER 20 0 8 | VO L. 51 | NO. 10 | COM M UN I CATI ON S OF THE ACM 83

Kari and Rozenberg, “The Many Facets of Natural Computing.” CACM, October 2008. Copyright Association for Computing Machinery. Article provided by
Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.csd.uwo.ca/~lila/p72.pdf.
55 WHY JOHNNY CANT STEAM: HOW VIDEO COPYRIGHT WENT INSANE 25

Why Johnny can't stream: How video copyright


went insane
Deploying 10,000 tiny antennas makes no technical sense—but the law demands it.

by James Grimmelmann - Aug 30 2012, 8:00am CDT

Aurich Lawson / Thinkstock

Suppose I could offer you a choice of two technologies for watching TV online. Behind Door Number
One sits a free-to-watch service that uses off-the-shelf technology and that buffers just enough of each
show to put the live stream on the Internet. Behind Door Number Two lies a subscription service that
requires custom-designed hardware and makes dozens of copies of each show. Which sounds easier
to build—and to use? More importantly, which is more likely to be legal?

If you went with Door Number One, then you are a sane person, untainted by the depravity of modern
copyright law. But you are also wrong. The company behind Door Number One, iCraveTV, was
enjoined out of existence a decade ago. The company behind Door Number Two, Aereo, just survived
its first round in court and is still going strong.

The difference between them—and the reason for Aereo's willfully perverse design—originated in a
critical 2008 DVR decision by the federal Second Circuit Court of Appeals in Cartoon Network v. CSC
Holdings (which everyone just calls "Cablevision"). The tech at issue in Cablevision was a "DVR in the
cloud," and because of the way the Second Circuit answered the question of whether a DVR
"performs" a copyrighted TV show when the user hits "play," the decision opened a whole range of
possibilities for entrepreneurs willing to mash up technologies in ways God never intended.

This is the story of Cablevision, the companies that followed in its wake, and how we got to the strange
place where wasting resources on thousands of tiny antennas made you legal—but where using one
antenna broke the law.

Backdrop
To understand what Cablevision decided and why it matters, we need to understand a bit about how
copyright law treats broadcasting and streaming. For a very long time, copyright has covered more
than just making copies. In 1856, for example, Congress gave playwrights an exclusive right to stage
their plays in public. That "public performance right" has gradually expanded to cover almost everything
that can be copyrighted and performed, from movies to musicals.

The meaning of a "public performance," however, has been surprisingly hard to pin down. For more
than a century, technologists have been coming up with unexpected ways of bringing media to people.
Some cases were easy: the courts quickly decided that showing movies in theaters and broadcasting

James Grimmelmann, “Why Johnny Cant Steam: How video copyright went insane.” Ars Technica, October 2012. Copyright Ars Technica. Article provided
by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://arstechnica.com/tech-policy/2012/08/
why-johnny-cant-stream-how-video-copyright-went-insane/.
5 WHY JOHNNY CANT STEAM: HOW VIDEO COPYRIGHT WENT INSANE 26

songs on the radio were public performances requiring permission of the rightsholder, while mere
audition (in English, that's "listening to the radio") was not.

Cable TV, though, broke the mold. Back when the typical cable TV
operator was an edgy upstart, the cable business model was
retransmission without the express written consent of anyone. A If the Internet is a
cable network would put up an antenna somewhere with good TV copyright minefield,
reception, lay wires over the hills and far away to communities with Cablevision had just
terrible TV reception, and relay the signals to paying subscribers
right-clicked a new
there.
safe square for
In a pair of decisions, 1968's Fortnightly v. United Artists and 1974's startups to stand on.
Teleprompter v. CBS, the Supreme Court held that cable
retransmission was not a "performance" for copyright purposes and
so didn't need copyright owners' permission.

"Broadcasters perform. Viewers do not perform," the court explained in Fortnightly. A cable network
was just a way to help viewers receive distant TV broadcasts, like a gigantic pair of rabbit ears.

But the Supreme Court had meddled with the primal forces of nature, and Congress promptly swung
into action, revising the law to override Fortnightly and Teleprompter. The 1976 Copyright Act added a
"transmit clause" to its definitions to make clear that whether a work was performed "by means of any
device or process" and whether the public received it "in the same place or in separate places and at
the same time or at different times," it would still infringe if transmitted without permission.

Meanwhile, Congress bought off the cable companies—who didn't like this at all—with a complicated
licensing scheme. In essence, copyright law was sucked into telecommunications law's gravity well. In
time, satellite TV broadcasters got the same deal: they were subject to copyright, but with their own
crazy-intricate licensing system spelling out exactly what they could do and how much it would cost.

Harmony and order returned to the universe—until the Internet came along.

Son of cable
The Internet has never played nice with carefully crafted regulatory schemes. Since streaming became
practical in the 1990s, a series of adventuresome dot-com entrepreneurs have been searching for a
way to repeat the cable systems' original legal coup, bringing live TV to Joe User—preferably without
paying to do so. (It's hard to make a living by streaming video when copyright owners can always turn
around and grab back your profits by demanding higher licensing fees. Exhibit 1: Netflix. Exhibit B:
Hulu.)

The first high-profile try was the aforementioned service behind Door Number One, the Canadian
website iCraveTV. It hoisted an antenna in Toronto, picked up TV signals from Buffalo, New York then
turned around and streamed those signals on the Internet (surrounded, of course, with ads). It tried to
lock out Americans, but it didn't try very hard (it asked users to enter a Canadian area code) and nearly
half of its viewership came from the United States. When the movie studios sued in the United States,
the court had little difficulty claiming jurisdiction over iCraveTV and its officers. An injunction was
entered; goodbye, iCraveTV.

More recently, websites like FilmOn and ivi have tried to solve the copyright problem by fleeing back
into telecommunications law. Both of them restream over-the-air TV on the Internet. ivi argued that it
was a "cable system" and was therefore entitled to the Copyright Act's special license for cable
companies; FilmOn called itself a "carrier" with a similar goal.

Neither ended well. A federal court shut down ivi, giving a long history of the cable license and pointing
out, rather inconveniently for ivi, that the company hadn't even attempted to comply with any of the
FCC's extensive rules for cable licensing. The appeals court agreed—an Internet streaming server is
not a "cable system." (While the FCC is slowly considering whether to start treating pure TV-over-IP
services like cable systems, it's not there yet.)

FilmOn agreed to an injunction and to pay $1.6 million.

Hope for the rebroadcasters, however, came from an unlikely place: the cable industry.

James Grimmelmann, “Why Johnny Cant Steam: How video copyright went insane.” Ars Technica, October 2012. Copyright Ars Technica. Article provided
by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://arstechnica.com/tech-policy/2012/08/
why-johnny-cant-stream-how-video-copyright-went-insane/.
5 WHY JOHNNY CANT STEAM: HOW VIDEO COPYRIGHT WENT INSANE 27

Like a DVR... in the cloud!


In the half-century since Fortnightly, the cable companies have grown from scrappy underdogs into
dominant media empires. Uneasy lies the head that wears the crown, however, and one of the
technologies that makes cable executives sweat is the DVR. Recording TV and watching it at one's
leisure has the potential to wrest control of the viewing experience away from the wire and put it in the
viewer's hands. The cable response—straight out of a business-school textbook—has been to embrace
the threat and get into the DVR business. Cable companies soon integrated DVRs into set-top boxes,
offering subscribers one-stop recording (for a fee, of course).

The boffins at Cablevision, a New York-area cable company, had an even better idea. They proposed
sucking the DVR out of the set-top box and moving it up into the cloud, placing the hard drive in a
Cablevision head-end facility where the TV signals are modulated for cable transmission.

As you might expect, Cablevision's announcement of its planned RS-DVR (short for "remote storage
DVR") drew the wrath of cable's traditional frenemies: the TV networks who supply most cable content.
The networks were largely powerless against traditional DVRs, thanks to the Supreme Court's decision
in the landmark Sony case. VCRs, the Court held, are legal to sell because customers could put them
to "substantial noninfringing uses," such as "time-shifting" live TV for later viewing. Nor is home
playback covered by copyright: that's a completely legal private performance unless you invite your
neighbors over and charge admission.

The networks liked their odds against the RS-DVR. The essence of the Sony defense had been that
the VCR left Sony's control when it was sold. The RS-DVR, however, was sitting right there in a
Cablevision head-end, on Cablevision property, where Cablevision techs could switch it off or
reprogram it at any moment. And unlike a VCR, where the signal starts in the home and stays there,
the RS-DVR transmits signals from the Cablevision head-end to the user's home. To the networks, this
seemed just like the question Congress settled when it overruled Fortnightly and Teleprompter:
transmissions by cable companies to viewers are public performances, and permission is required.

The networks sued to prevent Cablevision from rolling out the RS-DVR service and won at the trial
level.

But on appeal, Cablevision and the RS-DVR emerged triumphant. The Second Circuit seized on two
facts to justify its holding that watching a show on the RS-DVR wasn't a public performance. First, each
time a user recorded a program, the RS-DVR made a separate copy of it for her, storing it on her own
dedicated hard drive space. Second, each time she played back a program, it came from her own
stored copy. This, the court concluded, meant that while Cablevision might "perform" the TV shows by
streaming them, it didn't perform them for "the public." One person does not the public make, not if she
has her own copy.

The TV networks argued in vain that all of Cablevision's customers should be aggregated together as
"the public," since they were all receiving the broadcast the networks sent to Cablevision. But the court
concluded that the individual copies in the RS-DVR broke the "chain of transmissions" that took a TV
show from broadcaster to viewers. The transmission from NBC to Cablevision's RS-DVR was a (public)
performance; each transmission from an RS-DVR to its user was a separate (private) performance to
an audience of one. The RS-DVR was legal.

For Cablevision's customers, the consequences have been underwhelming. The RS-DVR rolled out
last year in a trial in the Bronx with the oh-so-catchy name of "DVR Plus" and a $10.95/month price tag.
(<crickets>) But for companies interested in building Internet businesses with a copyright angle,
Cablevision was a godsend. If the Internet is a copyright minefield, Cablevision had just right-clicked a
new safe square for startups to stand on.

James Grimmelmann, “Why Johnny Cant Steam: How video copyright went insane.” Ars Technica, October 2012. Copyright Ars Technica. Article provided
by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://arstechnica.com/tech-policy/2012/08/
why-johnny-cant-stream-how-video-copyright-went-insane/.
5 WHY JOHNNY CANT STEAM: HOW VIDEO COPYRIGHT WENT INSANE 28

Aereo—what an odd way to do things.

Thousands of tiny antennas


Now we're ready to look behind Door Number Two and see what a difference Cablevision makes.
Aereo is a New York startup backed by media baron Barry Diller, and its play is the same one cable
companies made in their Wild West days: rebroadcasting live over-the-air TV without anyone's
permission. Quietly stepping over the arrow-strewn bodies of its predecessors, Aereo filled its Brooklyn
data center with dime-sized antennas—80 on each circuit board, with 16 boards to a rack. When a user
is logged in, Aereo designates one of the antennas as "hers" and starts recording the chosen channel
to a unique copy on a hard drive, Cablevision-style. Then, just like with Cablevision's RS-DVR, she can
stream the stored video over the Internet.

Two aspects of this business model stand out. The first is how
precisely it hews to Cablevision. Each TV stream on Aereo, in
Cablevision's words, "is made to a single subscriber using a single Thousands of tiny
unique copy produced by that subscriber." The only significant antennas are a
difference is that Aereo starts with TV signals that come in over the ridiculous way of
air rather than on a wire. (As a sign of how dependent Aereo is on
capturing over-the-air
Cablevision, the service is only offered in New York, where the
Second Circuit's decisions apply. Cross the river to New Jersey,
TV. Storing a
which is part of the Third Circuit, and Aereo is unavailable in your permanent copy
area.) rather than a buffer
just large enough for
Second, the striking thing about how Aereo works is just how
gratuitously profligate it is with technology. Thousands of tiny streaming is a
antennas are a ridiculous way of capturing over-the-air TV. Storing pessimization, not an
a permanent copy rather than a buffer just large enough for optimization.
streaming is a pessimization, not an optimization. And of course
Aereo keeps as many separate copies of each program as there
are viewers who want it. If copyright law made sense, copyright
owners themselves would offer TV streaming on the Internet. But copyright law hasn't made sense for
years, and Aereo embraced the madness.

It worked. In July, a federal judge denied broadcasters' request for an injunction to shut down Aereo.
The broadcasters tried to get around Cablevision by arguing that the individual copies didn't really
count because—I am not making this up—the viewer could start streaming a show before it ended. It's
bizarre that buffering a TV show through a copy being recorded to a hard drive should let Aereo escape
liability, but the argument that viewers should have to wait until the end of the show is just as strange.
As the judge explained, the broadcasters' view would mean that a user "who begins watching a
recording of the Academy Awards, initially broadcast at 6:00 pm, one minute before the program ends
at 11:00 pm" would be watching an infringing public performance, while a viewer "who begins watching
a standard half-hour sit-com just a minute after its initial broadcast ends" would be watching a legal
private performance from her own copy.

In a bizarre postscript to the Aereo lawsuit, the entrepreneur behind FilmOn, Alki David, announced a
new service using the Aereo model, called BarryDriller.com. The subject of this off-color pun, Aereo's
backer Barry Diller, was unamused and promptly sued. The BarryDriller.com domain now redirects to
David's CBSYouSuck.com, a site that promotes David's ongoing suit against CBS and CNET for
distributing LimeWire.

James Grimmelmann, “Why Johnny Cant Steam: How video copyright went insane.” Ars Technica, October 2012. Copyright Ars Technica. Article provided
by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://arstechnica.com/tech-policy/2012/08/
why-johnny-cant-stream-how-video-copyright-went-insane/.
5 WHY JOHNNY CANT STEAM: HOW VIDEO COPYRIGHT WENT INSANE 29

The world's longest video cable


It's not just TV-on-the-Internet that got a jump-start from Cablevision. All kinds of other streaming-based
business models suddenly seemed possible, too. The crucial question was where to get the copy you
were streaming to a customer. Cablevision and Aereo got the copies when customers hit "record."
Cablevision had successfully argued that "the person who actually presses the button to make the
recording supplies the necessary element of volition [to infringe], not the person who manufactures,
maintains, or, if distinct from the operator, owns the machine." (Similarly, in home taping with VCRs and
DVRs, viewers make their own copies, which are often legal under fair use as time-shifting.)

A California startup called Zediva had another idea. It bought DVDs, taking advantage of the first sale
doctrine to become the undisputed owner of copies of movies. It filled a Santa Clara data center with
hundreds of DVD players. When a customer hit play on, say, Little Fockers, Zediva's servers reserved
a DVD player with the DeNiro/Stiller turkey in it, started the DVD playing, and streamed the video to the
customer over the Internet. Zediva called it "a DVD with a very long cable attached."

Once again, the business model looked engineered to take


advantage of Cablevision, and Zediva argued that its streams
weren't public performances because they went to individual Having an individual
viewers and no one else. And once again, it's a business model file for each user is
that would not exist in a world with copyright policy that was not crucial; using
demonstrably insane. Rapidly spinning optical discs make sense as
deduplication would
a distribution technology because they're compact and durable. But
they're a hassle and a half for playback, because they scratch, skip,
mean crossing out of
and make random access a pain. If you're going to use the Internet Cablevision country.
for distribution, better to take the DVDs out of the picture and use
them as coasters. But since Cablevision had opened up what
seemed like a gap in copyright law, Zediva poured shiny lacquered
discs into the breach.

Unfortunately for Zediva, it ran headlong into one of Cablevision's major limitations. Each Zediva
stream went to a unique subscriber—but it didn't come from a completely unique copy. After one user
finished watching Little Fockers, the DVD and player would go back into the pool for others to use. This
meant that the same DVD would be shown repeatedly to different users over time.

This mattered because of a case law that Cablevision had delicately tiptoed around. Long before DVRs
and Internet streaming video, there were video stores. One, Maxwell's Video Showcase, had tried to
compete with movie theaters by also renting video booths for two to four people. You would pick your
movie, get some popcorn, then sit on a luxurious upholstered bench and watch Raiders of the Lost Ark
on a gigantic nineteen-inch screen. In a case called Columbia Pictures v. Redd Horne, the court held
that Maxwell's engaged in infringing public performances because "it shows each copy [of a film]
repeatedly to different members of the public," even if not simultaneously.

Other courts reached similar results in cases involving hotels and adult theaters, so Cablevision
adopted a distinction between one copy and many. A million viewers and a million copies—OK. A
million viewers but only one copy—not OK. This reasoning doomed Zediva, because of course the
whole point of its business model was that it would reuse DVDs and stream them to different users in
rapid succession.

Pause to note what a silly distinction this is. Making separate copies for each user is a massive waste
of storage. Systems engineers would say that Cablevision should make only as many copies as it
needs to meet demand. Making more does nothing to improve the experience for users; it does nothing
to change the impact on copyright owners. All it does is drive up costs. But courts have to play the

James Grimmelmann, “Why Johnny Cant Steam: How video copyright went insane.” Ars Technica, October 2012. Copyright Ars Technica. Article provided
by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://arstechnica.com/tech-policy/2012/08/
why-johnny-cant-stream-how-video-copyright-went-insane/.
5 WHY JOHNNY CANT STEAM: HOW VIDEO COPYRIGHT WENT INSANE 30

hands they're dealt, and the Cablevision court was working with precedents that made the use of
individual copies highly significant. If it is fair to say that Cablevision won on a technicality, then it is
also fair to say that Zediva lost on one—and vice versa. These are precisely the kinds of technicalities
that matter in modern copyright law.

Rock lockers
Cablevision is even spilling over into the simmering dispute over file lockers. It's not entirely a
coincidence that Amazon, Google, and Apple—big companies with a lot to lose if they get their
copyright compliance wrong—all launched cloud-based music players in 2011. Their first line of legal
defense is presumably the DMCA safe harbor for user-uploaded content, but there are traces of
Cablevision in their policies.

The free versions of these music lockers require users to upload each and every song they want, no
matter how many others have uploaded the same song. (Apple and Amazon's paid versions, which will
match files in the user's collection, are licensed.) This might not be necessary for DMCA compliance,
but from a Cablevision perspective, having an individual file for each user is crucial; using deduplication
would mean crossing out of Cablevision country.

Or perhaps not. MP3tunes is (or maybe was) a music locker that deduplicates at a file-block level.
Music companies sued, citing Cablevision. But a federal judge thought that this deduplication wasn't a
problem, explaining, "The record demonstrates that MP3tunes does not use a 'master copy' to store or
play back songs stored in its lockers. Instead, MP3tunes uses a standard data compression algorithm
that eliminates redundant digital data." So either the judge didn't think that individual copies were
necessary, or he misunderstood what a "master copy" was.

The most ambitious music locker service doesn't even describe itself as one. Instead, ReDigi calls itself
"The World's First Pre-Owned Digital Marketplace." (The claim may be a bit overstated; similar ideas
include the Digital Content Exchange and this patent application.) Why buy "Rumor Has It" from iTunes
for $1.29 when someone else who already did is willing to sell it to you for 79 cents? ReDigi's offline
model is the used CD store—which of course is completely legal because of first sale.

But wait, you may be saying, at a used CD store the previous owner gives up the CD when the new
owner gets one. Online, don't they now both have a copy? Great question. ReDigi's answer involves
some DRM gymnastics. First, it uploads the track to its servers, giving the seller streaming access.
When the owner "sells" the track, ReDigi changes the ownership bits on the file, locking the seller out
and giving the buyer exclusive streaming access. (To keep the seller from simply uploading a copy and
keeping the original, ReDigi deletes the track from the seller's computer and uses DRM to make sure
it's never copied back.) In other words, ReDigi is a streaming music locker with a key that can be
transferred from one user to another.

ReDigi is a complicated bank shot off of Cablevision. It strings together Cablevision's public
performance rule—to justify streaming music originally uploaded by user A to user B—with a series of
other arguments. Uploads are personal fair use by users, not infringing copies made by ReDigi. A
change in the ownership bit is not an infringing "distribution" of anything to anyone. Downloads by the
new owner are personal fair use. And so on.

There are serious questions about whether all of the pieces really hang together. (A skeptic would say
that when the file changes "owners," it fails the individual-copies test in the same way that Zediva did.)
Still, the general picture should be familiar by now: a business using legal stepping stones to create a
path from Step One (online streaming) to Step Three (profit).

James Grimmelmann, “Why Johnny Cant Steam: How video copyright went insane.” Ars Technica, October 2012. Copyright Ars Technica. Article provided
by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://arstechnica.com/tech-policy/2012/08/
why-johnny-cant-stream-how-video-copyright-went-insane/.
5 WHY JOHNNY CANT STEAM: HOW VIDEO COPYRIGHT WENT INSANE 31

A complex legacy
The post-Cablevision cases are almost comically formalistic about technical details. Instead of looking
at the front-end user experience, they focus on the back-end hardware and software. Sooner or later,
someone is going to argue to a court that it makes a difference for copyright purposes whether a video
stream is decoded by the main CPU or by a dedicated graphics card—or some other distinction equally
remote from anything the typical viewer thinks about when trying to catch up on last week's episode of
Breaking Bad.

This technological formalism has real costs and real benefits for all concerned. On the upside, Lawful
Good technologists and investors need bright-line guidance. Imagine being a cloud computing vendor,
watching the file locker litigation and worrying that one judge could scuttle your entire business model.
Or worse, imagine being a cloud computing customer facing the risk that one judge could consign your
files to Davy Jones's locker.

Actually, there's no need to imagine: this is precisely what happened to MegaUpload's customers. Their
data was eaten by the cloud of legal uncertainty that is criminal copyright infringement. Faced with the
huge overhang of liability created by copyright doctrines that treat even evanescent "copies" in RAM as
potential infringements, courts may be crafting exceptions, like Cablevision's public performance rule,
to preserve some breathing room for innovation. Having clear rules can be helpful.

On the downside, the contortions required to fit through Cablevision's hoops can be cringe-inducing,
and not just for the technology companies blowing through their angel money to buy extra storage and
bandwidth. One man's "hoop" is another man's "loophole," and to copyright owners, Cablevision looks
like a copyright-evasion cookbook: How To Succeed in Piracy Without Really Infringing. From their
perspective, the post-Cablevision burst of innovation consists entirely of Frankenstein-style attempts to
resurrect business models already condemned by the courts.

The road not taken


Perhaps we can think about the problem of copyright on the Internet another way. Instead of asking
which back-end technologies are legal, it might make more sense to ask what it is legal for users to do
with computers on the front end. This approach would let people spend less time worrying about the
exact definitions of "reproduction" and "performance" and more time thinking about users' rights,
especially under fair use.

Cablevision itself illustrates what might have been. The whole point of the RS-DVR was that it was a
perfect substitute for a home DVR. Reasoning by analogy, then, we might say that the two ought to
either both be legal or both be illegal. And since home DVRs seem here to stay, it ought to be
permissible for Cablevision to offer its customers exactly the same service they could have gotten by
buying a gizmo. Call it "noninfringing personal fair use" and we can all go home.

The strangest thing about Cablevision is that the court didn't even get a chance consider that
argument. The parties agreed not to litigate the fair use issue. Yes, you read that right. It was a quid
pro quo: Cablevision didn't invoke users' fair use rights and the cable networks didn't try to hold
Cablevision liable for users' infringements. That turned a case about users' uses into a case about
Cablevision's technologies, changing a common sense debate over how far viewers can go in storing
TV programs and watching them later into an abstruse legal disputation over the minutiae of primary
ingest buffers and chains of transmission.

Another way of thinking about the decision is that the court wanted to provide a fair use ruling for
viewers but wasn't given the option, so it settled for much narrower rulings on the technologies
involved.

Copyrighted content is the nuclear fuel of the Internet. It powers high-energy innovation, but can cause
catastrophic legal meltdown if mishandled. Prolonged exposure has been scientifically proven to cause
business-model mutations. Cablevision gave risk-tolerant entrepreneurs an inanimate carbon rod:
enough to save the day for some of them, but hardly a long-term solution.

James Grimmelmann is a Professor at New York Law School.

James Grimmelmann, “Why Johnny Cant Steam: How video copyright went insane.” Ars Technica, October 2012. Copyright Ars Technica. Article provided
by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://arstechnica.com/tech-policy/2012/08/
why-johnny-cant-stream-how-video-copyright-went-insane/.
66 COULD YOUR IPOD BE HOLDING THE GREATEST MYSTERY IN MODERN SCIENCE32

$OJRULWKPLFWKLQNLQJLVOLNHO\WRFDXVH WKHPRVW GLVUXSWLYH


SDUDGLJPVKLIWLQWKHVFLHQFHVVLQFHTXDQWXPPHFKDQLFV

&RXOG <RXU L3RG %H WKH


+ROGLQJ

*UHDWHVW LQ0RGHUQ
0\VWHU\

6FLHQFH"
%HUQDUG &KD]HOOH
3ULQFHWRQ
8QLYHUVLW\

)XWXURORJLVWV DUHDQ DPLDEOH EXQFK VR LWLVDSX]]OH ZK\ JUHDW/RUG .HOYLQ EORYLDWHG WKLVJHP IRUWKHDJHV 7KHUH LV
WKHIXWXUHKDVEHHQ VRFUXHOWRWKHP)URP IO\LQJFDUVDQG QRWKLQJQHZ WREH GLVFRYHUHG LQSK\VLFV QRZ1RW KLV ORUG
VHOIFOHDQLQJKRXVHV WRWKDW
EXJDERR RIZRUNDKROLFV"WKH VKLS
VILQHVWKRXU
OHLVXUH VRFLHW\"WKH VRRWKVD\HU
V WUDLO LV OLWWHUHGZLWK WKH 0RRUH
V /DZ KDV IXHOHG FRPSXWHU VFLHQFH
V VL]]OH DQG
FDUFDVVHV RISHWSUHGLFWLRQV WXUQHGURDGNLOO VSDUNOHEXW LW
PD\ KDYH REVFXUHG LWVXQFDQQ\ UHVHPEODQFH WR
*RUGRQ 0RRUH QHHG QRWZRUU\7KH FRIRXQGHU RI ,QWHO SUH(LQVWHLQSK\VLFV KHDOWK\DQGSOXPS"DQG ULSHIRUDUHYR
WULHGKLVKDQGDWFU\VWDOJD]LQJ RQFH"DQG VWUXFNJROG+LV FHO OXWLRQ&RPSXWLQJ SURPLVHV WREH WKH
PRVW GLVUXSWLYH VFLHQWLI
HEUDWHGODZ PDNHV WKHRXWODQGLVK SUHGLFWLRQ WKDWHYHU\  LFSDUDGLJP VLQFHTXDQWXPPHFKDQLFV 8QIRUWXQDWHO\ LWLVWKH
PRQWKV OLNHFORFNZRUNZKLWHFODG WHFKQLFLDQVZLOO KXGGOH LQ SURYHUELDO ULGGOHZUDSSHG LQDP\VWHU\ LQVLGHDQHQLJPD7KH
D VLOLFRQZDIHU FOHDQ URRPDQGFUDPWZLFHDVPDQ\ WUDQVLVWRUV VWDNHVDUHKLJKIRURXU LQDELOLW\WRJHWZKDW FRPSXWLQJ LVDOO
RQWRDPLFURFKLS DERXWPD\ ZHOO SOD\ LFHEHUJ WRWKH7LWDQLF RIPRGHUQ VFLHQFH
0RRUH
V /DZ KDV UXOHGWKHURRVWIRUWKHODVWIRUW\ \HDUV$OO %ULOOLDQW IRUHVLJKWRU ODWHVWWULSHIURPWKH
.HOYLQ VFKRRO RI
WKHRRKV DQG DDKV \RX KHDU DERXW WKHGLJLWDO UHYROXWLRQ DUH SURSKHF\"&RPSXWLQJ LVWKH PHHWLQJ SRLQWRIWKUHH%LJ ,GHDV
QRWKLQJ EXW WKHVTXHDOV KXPDQV HPLWZKHQ WLFNOHGSLQNE\ XQLYHUVDOLW\GXDOLW\ VHOIUHIHUHQFH7R WKLVWULDGWKH
PRGHUQ
0RRUH
V /DZ )URP WKHQLFH PHGLFDO LPDJLQJHFRPPHUFH YLHZ DGGV WKHFRQFHSW RI WUDFWDELOLW\DQG WKHUHYROXWLRQDU\

ZKROHJHQRPH VHTXHQFLQJ  WRWKHYLWDO ;ER[ ,0 L3RG  LWV DOJRULWKPLFSDUDGLJP+HUH


V KRZ LW ZRUNV
UXOHKDVEHHQ DYHULWDEOH WLFNOHIHVW
0RRUH
V /DZ KDVEHHQ WKH
VL]]OLQJ FDXOGURQ LQZKLFK VDYY\ FRRNV KDYH ZKLSSHG XS D 8QLYHUVDOLW\
GD]]OLQJ YDULHW\RI WDVW\GLVKHV:LWKRXW LWWKH,QIRUPDWLRQ )HZ ZRXOG PLVWDNH \RXU L3RG IRUDQ ,%0 %OXH *HQH/"
6XSHUKLJKZD\ ZRXOG EH D EDFN DOOH\ WR6QRR]HYLOOH WKH WKHZRUOG
V IDVWHVWFRPSXWHU<HW IXQGDPHQWDOO\ WKHWZRDUH
FRROHVW WKLQJDERXW D FRPSXWHUZRXOG VWLOOEH WKHEOLQNLQJ WKHVDPH:K\ LVWKDW"$W WKHKHDUWRI\RXU L3RG LVDZULWWHQ
OLJKWV GRFXPHQWPDGH RIWZRSDUWVSURJUDPGDWD 7KH GDWD VHF
0RRUH
V /DZ KDVKDGDJRRG UXQEXWDODV LWVGD\V DUHQXP WLRQVWRUHVWKHVRQJV DV ORQJVHTXHQFHV RI2VDQG ,V7KH SUR
EHUHG %\PLGFHQWXU\ D UHSHDO LVDOO EXWFHUWDLQ:LWK WKH JUDP VHFWLRQH[SODLQV LQZRUGV DJDLQ2VDQG ,V  KRZ WRUHDG
KHDG\ GD\V RI WKH,QFUHGLEOH 6KULQNLQJ&KLS UHFHGLQJ LQWKH PL[ D VPDWWHULQJRI
WKHGDWDDQG WXUQLWLQWRVRXQG$GG WRWKLV
SDVWH[SHFW WKHUHYROXWLRQWRJULQGWRDKDOWH[SHFWSLRQHHUV WR KDUGZDUH WKHFRQWURO WRUHDG WKHSURJUDP DQG IROORZ LWV
JLYHZD\ WRWLQNHUHUV %\HE\H WLFNOHIHVWKHOOR VOXPEHUSDUW\ LQVWUXFWLRQVDQGYRLOD \RX
YH JRW\RXUVHOIDQ L3RG7KH EHDX
1R WHDUVSOHDVH 3HUFKHG DWRS WKHLUWRZHULQJDFKLHYHPHQWV RIWKHVFKHPH LVWKDWWKHFRQWUROQHHGQRWNQRZ D WKLQJDERXW
W\
FRPSXWHU VFLHQWLVWV WKHFRRNV UHPHPEHU" ZLOO EDVN LQWKH PXVLF ,Q IDFWVLPSO\E\GRZQORDGLQJ WKHDSSURSULDWH SUR
VRRWKLQJFHUWDLQW\WKDWWKHLUJORULRXV VFLHQFH GLHG DW LWVSHDN JUDPGDWDGRFXPHQW \RX FDQ WXUQ\RXU L3RG LQWRDQ HDUWK
:LWK D WLQJHRIVDGQHVV EXWQRWD OLWWOHSULGH WKH\
OOFKLPH LQ TXDNH VLPXODWRUDZRUG SURFHVVRU DZHE EURZVHURUDSDSHU
XQLVRQ 7KHUH LVQRWKLQJ QHZ WREH GLVFRYHUHG LQFRPSXWHU ZHLJKW<RXU GDLQW\ OLWWOH 03 SOD\HU LVDXQLYHUVDO FRPSXWHU
VFLHQFHQRZ 6HSDUDWLQJ FRQWURO WKHKDUGZDUH  IURPSURJUDP WKHVRIW
PRYLH EHIRUH\RXKDYH$ IHZ ZDUH  ZDV WKH
,I\RX WKLQN\RX
YH VHHQWKLV PDMRU LQVLJKWRI$ODQ 7XULQJ"ZHOO EHVLGHV WKLV
VKRUW\HDUVEHIRUH(LQVWHLQ WXUQHGRXUZRUOG XSVLGH GRZQ WKH OLWWOHFRGHEUHDNLQJ WKLQJKHGLG LQ%OHWFKOH\ 3DUN WKDWKHOSHG

 $35,/

Bernard Chazelle, “Could your iPod be holding the greatest mystery in modern science.” Math Horizons, April 2006. Copyright Mathematical Association
of America. Article provided by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http:
//www.cs.princeton.edu/~chazelle/pubs/ipod.pdf.
6 COULD YOUR IPOD BE HOLDING THE GREATEST MYSTERY IN MODERN SCIENCE33

0$7+ +25,=216

ZLQ:RUOG:DU ,,7KH VHSDUDWLRQZDV WKHNH\ WRXQLYHUVDOLW\


1R RQHKDG VHHQDQ\WKLQJTXLWH OLNHLW
EHIRUH$W OHDVWQRWVLQFH
WKH&KLQHVH SKLORVRSKHU RSLQHG *LYH DPDQ D ILVKDQG \RX
IHHGKLPIRUDGD\7HDFK DPDQ WRILVKDQG\RX IHHGKLPIRUD
OLIHWLPH

,Q&RQIXFLXV
V KDQGV WKHVSHFLDOL]HG YLHZRI

ILVKLQJ ULYHUILVKHUPDQ
ILQGVLWVHOIUHSODFHGE\DXQLYHUVDORQH

ILVKLQJ ULYHU ILVKLQJPDQXDO  \RX
7KHUH \RXKDYH LW

FRPSXWLQJ GDWD SURJUDP FRQWURO
7KH FRQWUROSDUWRI\RXU L3RG LVDPDUYHO RIHOHFWURQLFV EXW
WKHVKRFNHULVWKDWLWQHHGQRWEH VRXQLYHUVDO FRPSXWHUVFDQ
EH EXLOWZLWK FRQWUROER[HV YDVWO\ VLPSOHU WKDQD FXFNRR
FORFN)RUDOOSXUSRVHV

FRPSXWLQJ GDWD SURJUDP
&DUWRRQ E\-RKQ-RKQVRQ
'XDOLW\
/HW
HPHDWFDNH
&RQVLGHU WKHL3RGGRFXPHQW 3ULQW WKLV
3XVK WKHVWDUWEXWWRQDQGZDWFK WKHZRUGV /HW
HPHDWFDNH
IODVKDFURVV WKHVFUHHQ1RWH KRZ WKHSURJUDPSDUWRIWKHGRF RQHDIWHUWKHRWKHUVR LWORRNV OLNHDUHJXODUSURJUDPGDWD L3RG
XPHQW3ULQW WKLVLV LQWHUSUHWHGDV D FRPPDQG"SULQWLQJ LV GRFXPHQW ELOOLRQV RIOHWWHUVORQJWKRXJK 
ZDQWV DQGSULQWLQJLV
ZKDW LW ZLWK WKH
ZKDW LWJHWV&RQWUDVW WKLV
$&$$*$7 *&&$77* 7*77&7$ &**7$$&
GDWD SDUW/HW
HPHDW FDNHZKLFK LVWUHDWHGDV SODLQ WH[WQR
7KH EDVH SDLULQJV $7  DQG &*  HQVXUH WKDWWKHWZR
RQH
V HDWLQJ DQ\WKLQJ WR0DULH$QWRLQHWWH
V ODWHUFKDJULQ 
VWUDQGVVSHOO WKHVDPHZRUGZLWKGLIIHUHQWOHWWHUV6RZH ORVH
6WULQJVRI2VDQG ,VDUH LQWHUSUHWHGLQRQHRIWZRZD\V DV IRUP QR JHQRPLF LQIRUPDWLRQLIZH WUDQVODWH WKHGDWD SDUW DQG
GDWD RUDVFRQWHQW SURJUDP 7DSSLQJ LQWRWKHFRPLFDUWLVWLF ZKROH GRFXPHQW DV WKHGXSOLFDWHG WH[W
UHZULWHWKH
DQG DFDGHPLF SRWHQWLDO RI WKLVGXDOLW\JUHDWPLQGV ZHQW WR
$&$$*$7*&&$77* $&$$*$7 *&&$77*
ZRUN $EERWW DQG&RVWHOOR :KR
V RQ )LUVW"  0DJULWWH
7KLV LVWKHELRORJLFDO DQDORJ RI3ULQW WKLVWZLFH3ULQW WKLV
&HFL Q
HVWSDV XQHSLSH  DQG6DXVVXUH VLJQLILHGYV VLJQL WZLFH/LIH
V EXWDZDONLQJ VKDGRZ0DFEHWK ZDUQHG XV1RW
ILHU  6WDULQJDWWKHVXEOLPHZLOO RIFRXUVH VHQG WKHGHHSHU
TXLWH/LIH
V EXWD VHOISULQWLQJL3RG2IIHQGHG VRXOVZLOO EDQJ
WKLQNHUVDPRQJ XV UXVKLQJIRUWKHFODVVLFV"VXFK DV+RPHU
RQ SUHDFKLO\ DERXW WKHUHEHLQJPRUH WRKXPDQ OLIHWKDQWKH
6LPSVRQ
V LPPRUWDOTXLS 2K0DUJH FDUWRRQVGRQ
WKDYH DQ\ EOLQGSXUVXLWRI VHOIUHSOLFDWLRQ"WKRXJK +ROO\ZRRG
V W\SLFDO
GHHSPHDQLQJ WKH\
UHMXVW VWXSLGGUDZLQJV WKDWJLYH \RX D IDUHZRXOG VHHP WRUHIXWHWKDW([LVWHQWLDO DQJVWDVLGHGXDOLW\
FKHDS ODXJK LV WKH RSWLRQ ZH KDYH WR LQWHUSUHW WKH ZRUG
$&$$*$7*&&$77* HLWKHUDV JHQHV WKHIRUPHQFRG
6HOI5HIHUHQFH
LQJRXU JHQRPH  RUDV SURWHLQV WKHFRQWHQWPHGLDWLQJ WKH
:ULWH WKHL3RGGRFXPHQW 3ULQWWKLVWZLFH3ULQW WKLVWZLFH
'1$ UHSOLFDWLRQ  6HOIUHIHUHQFH LVWKHGXSOLFDWLRQ HPERGLHG
DQGSUHVV WKHVWDUWEXWWRQ7KH VFUHHQ OLJKWVXSZLWK WKH
ZRUGV
LQWKHEDVH SDLULQJV9LHZHG WKURXJKWKHFRPSXWLQJ OHQV
3ULQW WKLVWZLFH3ULQW WKLVWZLFH/R DQG EHKROG WKHWKLQJ
OLIH  GXDOLW\ VHOIUHIHUHQFH
SULQWV LWVHOI-XVWOLNHD FRPSXWHU YLUXV UHPHPEHU ,GLG QRW
WHDFK\RX WKLV 7KHPDJLF ZRUG LVWZLFH )RU H[DPSOH WKH ,Q WKH 1DWXUH DUWLFOH WKDWXQYHLOHG WRWKHZRUOG WKH
L3RG GRFXPHQW 3ULQW WKLV3ULQW WKLV SULQWV WKLV 3ULQW VWUXFWXUHRI'1$ :DWVRQ DQG&ULFN VLJQHGRIIZLWK WKLVORYH
WKLV"PRUH 'U 6HXVV WKDQ VHOIUHSOLFDWLRQ O\XQGHUVWDWHPHQW,WKDVQRWHVFDSHG RXUQRWLFH WKDWWKHVSH
7KH %LJ ,GHDVZHUH WKHDLUWKDWWKH
*DQJ RI)RXU3ULQFH FLILFSDLULQJ ZH KDYHSRVWXODWHG LPPHGLDWHO\VXJJHVWVDSRVVL
WRQEUDQFKEUHDWKHGDOO GD\"WKDW ZRXOG EH$ORQ]R &KXUFK EOH FRS\LQJPHFKDQLVPIRU WKHJHQHWLFPDWHULDO 'XDOLW\ DQG
$ODQ 7XULQJ.XUW *RGHO DQG -RKQYRQ1HXPDQQ 0RWKHU VHOIUHIHUHQFHHPEHGGHG LQPROHFXOHV ZKDW VZHHWPXVLF WR
1DWXUH RIFRXUVH ILJXUHGLWDOORXWDIHZELOOLRQ \HDUV HDUOLHU PXVWKDYHEHHQ$ODV RXUZDU KHURZDV D OLW
7XULQJ
V HDUV WKLV
5HIRUPDW \RXUJHQRPH E\ OLQLQJXS WKHWZRVWUDQGVRI'1$ WOHGLVWUDFWHGDWWKHWLPHEXV\ DVKHZDV HQMR\LQJ WKHUHZDUGV

&RQWLQXHG RQSDJH 


:::0$$25*0$7++5,=16 

Bernard Chazelle, “Could your iPod be holding the greatest mystery in modern science.” Math Horizons, April 2006. Copyright Mathematical Association
of America. Article provided by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http:
//www.cs.princeton.edu/~chazelle/pubs/ipod.pdf.
6 COULD YOUR IPOD BE HOLDING THE GREATEST MYSTERY IN MODERN SCIENCE34

0$7+ +25,=216

&RQWLQXHGIURPSDJH  HFRPPHUFH 7KDW GD\ZLOO VHH ELRORJ\ FRQTXHU LWVKLJKHVW


WKDWWKH%ULWLVK DXWKRULWLHVKDG ODYLVKHG XSRQ KLP IRUVDYLQJ SHDN SURWHLQIROGLQJDQGPDWKHPDWLFLDQV FRQWHPSODWH HDUO\
:RUOG:DU ,,"JHQHURXV UHZDUGV OLNH
PLOOLRQV RIOLYHVGXULQJ UHWLUHPHQW,QGHHG WKHGD\ WKH-XUDVVLF,. DUH VKRZQ WREH
DFRXUWFRQYLFWLRQ IRUKRPRVH[XDOLW\ ZLWKDVHQWHQFHRIIRUFHG WUDFWDEOH 3 13 LQFRPSXWHUSDUODQFH  SURRIILQGLQJZLOO EH
HVWURJHQ LQMHFWLRQV$OPRVW RQH \HDU WRWKHGD\ RI
:DWVRQ DQG UHYHDOHG WREHQRPRUH GLIILFXOWWKDQSURRIFKHFNLQJ$QGUHZ
&ULFN
V WULXPSK $ODQ 7XULQJZHQW KRPH LQMHFWHGF\DQLGH LQWR :LOHV WKHFRQTXHURU RI)HUPDW
V /DVW 7KHRUHP ZLOO EH IRXQG
ZDV
DQDSSOH DWH LWDQGGLHG+LVPRWKHUSUHIHUUHGWREHOLHYH LW WRGHVHUYH QRPRUH FUHGLWWKDQKLVUHIHUHHV 1RWH WKDWWKLVVD\V
DQ DFFLGHQW
QRWKLQJDERXWXQGHUVWDQGLQJ WKHSURRI 7R EH3RUQRWWREH3
WKDWLV13
V TXHVWLRQ ,WLVOLNHO\WKDW3 13 ZRXOG GR IRUVFL
7UDFWDELOLW\ HQFHZKDW WKHGLVFRYHU\ RI WKHZKHHO GLG IRUODQG WUDQVSRUWD

%LJ ,GHDZDV WKHKRKXPREVHU


7KH JHQHVLV RIWKLVIRXUWK WLRQ/LWWOHZRQGHU QRRQHEHOLHYHV LW
YDWLRQ WKDWFKHFNLQJ WKHYDOLGLW\ RIDPDWK SURRI WHQGVWREH ZKHHO LVDOZD\V QLFHEXWWRUROO ORJV LQWKH
7R GLVFRYHU WKH
PXFK HDVLHU WKDQILQGLQJWKHSURRI LQWKHILUVWSODFH %XW LVLW PXG KDV LWVFKDUPV WRR/LNHZLVH WKHLQWUDFWDELOLW\RISURRI

UHDOO\"$PD]LQJO\ QRRQHNQRZV ILQGLQJZRXOG KDYH LWVEHQHILWV:KHQ \RX SXUFKDVH DERRN


:HOFRPH WRWKH PRVW LPSRUWDQW RSHQTXHVWLRQ LQDOORIFRP IURP$PD]RQ WKHDVVXUDQFH WKDW\RXU WUDQVDFWLRQLVVHFXUH LV
SXWHUVFLHQFH(YHUZRQGHUHG LI\RXU L3RG
V WXQH OLEUDU\ SUHGLFDWHG RQPRUH WKDQ\RXUHQGHDULQJQDLYHWH)RURQH WKLQJ
LVULFKHQRXJK WROHW\RX FRPSLOH D SOD\OLVW RI D WKRXVDQG LWUHOLHV FULWLFDOO\RQ WKHLQWUDFWDELOLW\RI IDFWRULQJDQXPEHU
VRQJVQR WZRZKLFK KDYH HYHUEHHQ SOD\HG EDFNWREDFN RQ LQWRSULPHV
079" /HW
V KRSH QRWEHFDXVH QRWHYHQ DQ,%0 %OXH *HQH/ -XVWDVPRGHUQ SK\VLFV VKDWWHUVWKHSODWRQLF YLHZ RIDUHDO
FRXOG GR WKHMRE LQOHVV WLPHWKDQKDV SDVVHG VLQFHGLQRVDXUV LW\DPHQDEOH WRQRQLQYDVLYH REVHUYDWLRQ WUDFWDELOLW\FOREEHUV
ZHUH ODVWVHHQURDPLQJWKHHDUWK7R ILQGVXFKDSOD\OLVW SURRI FODVVLFDO QRWLRQVRINQRZOHGJH WUXVW DQGEHOLHI1R OHVV)RU

ILQGLQJ  VHHPVKRSHOHVVO\ KDUGHYHQRQDFRPSXWHUEXWWRWHVW D WDVWHRI LWFRQVLGHU WKHJUHDW]HURNQRZOHGJH =.  SDUDGR[


ZKHWKHU D WHQWDWLYHSOD\OLVWILWV WKHELOO SURRIFKHFNLQJ  LVD WZRPXWXDOO\ GLVWUXVWLQJSDUWLHV FDQ FRQYLQFH HDFK RWKHUWKDW
PDWFK DOOSRVVLEOH SDLUVDJDLQVW079
V FRPSOHWH
FLQFK VLPSO\ HDFK RQH KROGV D SDUWLFXODU SLHFH RI LQIRUPDWLRQZLWKRXW

SOD\OLVWZKLFK LVUHDGLO\DFFHVVLEOH RQ WKHZHE UHYHDOLQJ D WKLQJDERXW LW3LFWXUH WZRILOWK\ULFK


EXVLQHVVPHQ
7KH WZLQ UHDOLW\ RIKDUG SURRIILQGLQJ DQG HDV\ SURRI VWXFNLQDQHOHYDWRU7KHLU LPPHGLDWHJRDO LV ZKDWHOVH"  ILQG

FKHFNLQJ LVKDUGO\DQ079LQGXFHG DEHUUDWLRQ&RPSXWHU VFL LQJRXWZKR


V WKHZHDOWKLHU =. GLDORJXHV SURYLGH WKHPZLWK
HQWLVWVKDYH FDWDORJXHG RYHU  SUREOHPV MXVW OLNH LW2I WKHPHDQV WRGR VRZKLOH UHYHDOLQJ ]HUR LQIRUPDWLRQDERXW
FRXUVH FRXUWHV\ RI0XUSK\
V /DZ WKHVH -XUDVVLF,. WKHLURZQZRUWK PDWHULDOZRUWK WKDWLV"WKH RWKHUNLQG LV
LQFOXGHDOORIWKHTXHVWLRQV KXPDQLW\ LVGHVSHUDWH WRDQVZHU" DOUHDG\ LQIXOOYLHZ 
LQDUWLILFLDO LQWHOOLJHQFHFRPSXWDWLRQDO ELRORJ\ UHVRXUFHDOOR +HUH LVD=. TXHVWLRQ IRUWKH6WDWH'HSDUWPHQW FDQ D VLJ
FDWLRQ UDWLRQDOGUXJGHVLJQ HWF QDWRU\ WRWKH1XFOHDU 1RQ3UROLIHUDWLRQ 7UHDW\ GHPRQVWUDWH
2. VR OLIHLV WRXJK%XW VLQFHZKHQ KDV WKDWREVHUYDWLRQ FRPSOLDQFH ZLWKRXW UHYHDOLQJ DQ\ LQIRUPDWLRQZKDWVRHYHU
TXDOLILHG DVD%LJ ,GHD" DERXW LWVQXFOHDU IDFLOLWLHV"-XVWDVJDPH WKHRU\LQIOXHQFHGWKH
6LQFH  URXJKO\ -XVWDV(LQVWHLQ UHEXLOW1HZWRQLDQ WKLQNLQJRIFROGZDU VWUDWHJLVWVGRQ
W EH VXUSULVHG WRVHH=.
PHFKDQLFV DURXQG WKHFRQVWDQF\ RI WKHVSHHG RI OLJKW&RRN WKHRU\EHFRPH WKHUDJH LQLQWHUQDWLRQDOUHODWLRQVFLUFOHV
(GPRQGV .DUS DQG /HYLQ VHWRXW WR UHEXLOG FRPSXWLQJ 7UDFWDELOLW\ UHDFKHV IDUEH\RQG WKHUDFHWUDFNZKHUH FRP
DURXQG WKHQRWLRQRI WUDFWDELOLW\$ SUREOHP LVWUDFWDEOHLILW SXWLQJFRPSHWHV IRUVSHHG ,WOLWHUDOO\IRUFHVXV WRWKLQNGLIIHU
FDQEH VROYHG LQWLPHJURZLQJSRO\QRUPDOO\ LQWKHLQSXWVL]H HQWO\7KH DJHQWRIFKDQJH LVWKHXELTXLWRXV DOJRULWKP
ZKLFK LVD IDQF\ZD\ RI VD\LQJUHDVRQDEO\ IDVW1RQH RIWKH
-XUDVVLF,. DSSHDU WREH WUDFWDEOH$W OHDVWWKRVH LQWKHNQRZ 7KH 5HYROXWLRQ
$OJRULWKPLF
EHOLHYH WKH\DUHQRW"RI FRXUVH QRWVR ORQJDJR WKRVHLQWKH $Q DOJRULWKP LVDQ L3RGSURJUDPZLWK DKXPDQ IDFH ,ID
NQRZ EHOLHYHG WKHHDUWKZDV IODW6DGO\ WKHJUHDWSURPLVH RI FRPSXWHU FRXOGZDVK \RXUKDLU LWVSURJUDPZRXOG ORRN OLNH
FRPSXWLQJ VHHPV WROLHZLWKSUREOHPV DIIOLFWHGZLWK H[SRQHQ  EXW WKHDOJRULWKP EHKLQG LWPLJKW
WLDOLWLVWKHGUHDGHG DLOPHQW WKDWSODFHV HYHQ VPDOOVL]H SURE UHDG 5LQVH ODWKHUUHSHDW"
 'RQ
W WU\WKLVDWKRPH LI\RX
UH
OHPVEH\RQG WKHUHDFKRIDQ\FRPSXWHU DFRPSXWHUVFLHQWLVW $Q DOJRULWKP LVD OLVWRILQVWUXFWLRQVWKDW
7KLV PXFK ZH NQRZ LW
VJHQHWLF ,ID VLQJOH RQH RI WKH WHOOVWKHFRPSXWHUZKDW WRGR ,W
PD\ ORRSDURXQGDQGHQWHUWDLQ
ZRQGHU RIZRQGHUV DOORIWKHP
-XUDVVLF,. LVWUDFWDEOHWKHQ DOWHUQDWLYHVDV LQ5LQVH ODWKHUUHSHDW LIXQKDSS\GU\JR WR
DUH7KHVH WRXJKSX]]OHV DUHQRWKLQJEXWGLIIHUHQWWUDQVODWLRQV RIILFHDQVZHU TXHVWLRQ ZK\GLGQ
W\RX ULQVH WKHVKDPSRR RII
RI WKH VDPH 6KDNHVSHDUH SOD\+HDG\ VWXII7KH GD\ \RXU \RXUKDLU9 $Q DOJRULWKP LVLQHVVHQFH DZRUN RIOLWHUDWXUH
SOD\OLVW TXHVWLRQ FDQEH DQVZHUHG LQD IHZKRXUVZLOO EH WKH 7KH OLEUDU\
V ERWWRP VKHOYHV PLJKW VWDFN WKHRQHOLQH

GD\SXEOLFNH\ FU\SWRJUDSK\GLHV EULQJLQJGRZQZLWK LWDOORI ]LQJHUV"DOJRULWKPLF PLQLDWXUHV WKDWORRS WKURXJKD WULYLDO

 $35,/

Bernard Chazelle, “Could your iPod be holding the greatest mystery in modern science.” Math Horizons, April 2006. Copyright Mathematical Association
of America. Article provided by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http:
//www.cs.princeton.edu/~chazelle/pubs/ipod.pdf.
6 COULD YOUR IPOD BE HOLDING THE GREATEST MYSTERY IN MODERN SCIENCE35

0$7+ +25,=216

DOJHEUDLF FDOFXODWLRQ WRSURGXFHIUDFWDOV SLFWXUHVRIGD]]OLQJ D YHULILHUSLFN WHQOLQHVDWUDQGRP2Q WKHEDVLV RIWKHVHWHQ


EHDXW\ DQG LQILQLWHLQWULFDF\  RUSULQW WKH WUDQVFHQGHQWDOO\ OLQHV DORQH WKHYHULILHUZLOO GHFLGH ZKHWKHU \RXUSURRI LV
P\VWHULRXV GLJLWVRI$OJRULWKPLF ]LQJHUVFDQGR HYHU\WKLQJ FRUUHFW7KH VKRFNHUEH\RQG DQ\UHDVRQDEOH GRXEWKHZLOO EH
ZH KDYH WKHVRQQHWVRQ WKH
)RU WKHUHVW PLGGOH VKHOYHV:LWK ULJKW
QDPHV OLNH))756$ /// $.6 WKH\DUHVKRUWDQGFULVSDQG 7KHPLQG UHHOV ,I\RXUSURRI LVILQHWKHQLW ZLOO SDVV DQ\
WHQGWRSDFNPRUH LQJHQXLW\SHUVTXDUH LQFKWKDQDQ\WKLQJHOVH WHVWWKHYHULILHUFDQ WKURZDW LW%XW EDVHG RQ RQO\ WHQOLQHV
LQWKHFRPSXWLQJZRUOG 7KH WRSVKHOYHVKROG WKHOXVKULFKO\ KRZ FDQKHNQRZ WKDW\RX
YH SURYHQ WKH5LHPDQQ K\SRWKHVLV
PXOWLOD\HUHG QRYHOV
WH[WXUHG DQGQRWDEDE\ FRXVLQ OLNH " ,I\RXUSURRI LVERJXV WKH
*LYH LWWRWKHPDOJRULWKPLF]LQJHUVNQRZ KRZ WRPDNH D LQWXLWLRQGRHV QRWKHOSPXFK HLWKHU3UHVXPDEO\ WKHDJUHHG
VFLHQWLVWVZRRQ1R RQHZKR
V HYHU WULHGWRFRPSXWH WKHGLJLWV XSRQ IRUPDWLVGHVLJQHG WRVPHDUDQ\EXJ DOODFURVV WKHSURRI
RI 7FE\KDQG FDQ UHPDLQXQPRYHG DW WKHVLJKWRI LWVGHFLPDO %XW KRZZLOO WKHYHULILHUEH VXUHWKDW\RXGLGQ
WSOD\ IDVWDQG
H[SDQVLRQ IORRGLQJDFRPSXWHU VFUHHQ OLNHODYD IORZLQJGRZQ ORRVHZLWK WKHIRUPDWWLQJUXOHV"7KH 3&3 DOJRULWKPXSHQGV
DYROFDQR$QG WKDW
VQRWHYHQ WKHDZHVRPH SDUW)RU WKDW
RQH EDVLF QRWLRQV RIHYLGHQFH DQG SHUVXDVLRQ DQG DFFRPSOLVKHV
PXVW WXUQWRWKHLQIDPRXV%UD]LOLDQ EXWWHUIO\
ZKRVH HYLOZLQJ ZKDW LVXVXDOO\ SKLORVRSK\
V SUHURJDWLYH WRWXUQWKHFRPSUH
IODSVFDXVH W\SKRRQVLQ&KLQD =LQJHUV HPERG\ WKHSRWHQWLDO KHQGHG LQWRWKHLQFRPSUHKHQVLEOH 6RPHZKHUH:LWWJHQVWHLQ
RID ORFDO DFWLRQ WRXQOHDVK FRORVVDO IRUFHVRQ DJOREDO VFDOH PXVW EH VPLOLQJ
FRPSOH[LW\HPHUJLQJRXWRIWULYLDOLW\
&HOOXODU DXWRPDWDFKDRV 0RRUH
V /DZ KDV SXWFRPSXWLQJ RQ WKHPDS DOJRULWKPV
G\QDPLFDO V\VWHPVDQGDOO WKDW
WKHRU\ ZLOO QRZ XQOHDVK LWVWUXHSRWHQWLDO 3K\VLFV DVWURQRP\DQG
)RU DJOLPSVH RIWKHILFWLRQJHQUHRQ WKHWRSVKHOYHV FKHFN FKHPLVWU\DUH DOO VFLHQFHV RIIRUPXODH &KDRV WKHRU\PRYHG
RXW3&3 6XSSRVH WKDWDIWHUSRSSLQJ WKHJHQLXVSLOO\RXZDNH WKHDOJRULWKPLF]LQJHU WRFHQWHUVWDJH7KH TXDQWLWDWLYH VFLHQFHV
XSRQH EULJKW
PRUQLQJZLWKD FRPSOHWHSURRIRIWKH5LHPDQQ RI WKHVW FHQWXU\ HJJHQRPLFV QHXURELRORJ\  ZLOO FRP
K\SRWKHVLV \RXUKHDG WKDW
VWKH1RWRULRXV %,* RIPDWK
LQ SOHWH WKHGHWKURQHPHQWRIWKHIRUPXOD E\SODFLQJ WKHDOJRULWKP
UDS WKHELJJHVWRSHQSUREOHP LQWKHILHOG )HZ QXPEHU WKHR DW WKHFRUH RI WKHLU
PRGXV RSHUDQGL$OJRULWKPLF WKLQNLQJLV
ULVWVDUH OLNHO\WROLVWHQWR\RXUVWRU\
7KDW LVXQWLO\RX RIIHU OLNHO\WRFDXVH WKHPRVW GLVUXSWLYHSDUDGLJP VKLIWLQWKHVFL
WKHPWKH3&3 3UREDELOLVWLFDOO\&KHFNDEOH 3URRI  GHDO<RX
OO HQFHV VLQFH TXDQWXPPHFKDQLFV $QG\HV \RXPD\ WUXVWWKH
ZULWHGRZQ \RXUSURRI LQDQDJUHHGXSRQ IRUPDWDQG WKHQOHW IXWXUHWREHNLQG WRWKLVSUHGLFWLRQ

L"7KH ,QGH[LQJ &RQWLQXHV "A"L"


WR
,QGH[  
3UREOHPV
0DWKHPDWLFDO
44+2S+
,QFOXGHVSUREOHPV IURP MRXUQDOVVXFKDV
A

?<A!A-
 
7ZR<HDU&ROOHJH 0DWKHPDWLFV-RXUQDO
";AA7A9A  M
DQG
0DUN
%RZURQ , 7KH $PHULFDQ 0DWKHPDWLFDO 0RQWKO\ ,,
A!AA
0DWKHPDWLFV 0DJD]LQH
3UREOHPV

RIRYWU 7KH 1HZ <RUN 6 DWH 0DWKHPDWLFV 7HDFKHUV -RXUQDO ,,
ZLWK $XWKRU
.QYZRUG
6XEMHFW DQG
&LWDWLRQ
,QGH[HV
P
 &UX[ 0DWKHPDWLFRUXP
A"D 6AN -RXUQDO RI5HFUHDWLRQDO 0DWKHPDWLFV HWF

9+++++O SS9[
+DUGERXQG 
,6%1 
,QGH[ WR0DWKHPDWLFDO 3UREOHPV FRQWDLQV WKHWH[WIURPWKRXVDQGV RISUREOHPV WKDW ZHUH SXEOLVKHG LQMRXUQDO L ,
SUREOHPFROXPQV GXULQJWKH\HDUV  7KH SUREOHPV DUH FODVVLILHG DQG WKHQVRUWHG E\WRSLF5HIHUHQFHV D `1A
ZKHUH WKHVROXWLRQWRWKHSUREOHPFDQ EH IRXQGLQWKHOLWHUDWXUH$OVR LQFOXGHGDUH FRPSUHKHQVLYH O0DWK3UR3UHO
DUH JLYHQ IRU
DXWKRU WLWOHFLWDWLRQDQG NH\ZRUG LQGH[HV DVZHOODV SUREOHPV IURPQDWLRQDODQG LQWHUQDWLRQDO PDWKHPDWLFDO RO\PSLDGV
%URZVH WKHSUREOHPV IRULQVSLUDWLRQRU ORFDWHRQH RQD VSHFLILF WRSLF ,QFOXGHVD OLVW
RIXQVROYHG SUREOHPV

7KHUH LVORWV
RIIUHHLQIRUPDWLRQ
DERXW SUREOHPVSUREOHPERRNV SUREOHPVROYLQJDQG SUREOHP MRXUQDOVRQRXUZHE VLWH

BZZZPDWKSURSUHVV
7R RUGHUFDOO WROOIUHH
FRPB
LQWKH86 RU&DQDGD RUHDV\ RUGHURQOLQHDWZZZ0DWK3UR3UHVVFRP

:::0$$25*0$7++25,=216

Bernard Chazelle, “Could your iPod be holding the greatest mystery in modern science.” Math Horizons, April 2006. Copyright Mathematical Association
of America. Article provided by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http:
//www.cs.princeton.edu/~chazelle/pubs/ipod.pdf.
77 SCOOPING THE LOOP SNOOPER: A PROOF THAT THE HALTING PROBLEM IS UNDECIDABL

SCOOPING THE LOOP SNOOPER


A proof that the Halting Problem is undecidable
Geoffrey K. Pullum
(School of Philosophy, Psychology and Language Sciences, University of Edinburgh)

No general procedure for bug checks will do.


Now, I won’t just assert that, I’ll prove it to you.
I will prove that although you might work till you drop,
you cannot tell if computation will stop.

For imagine we have a procedure called P


that for specified input permits you to see
whether specified source code, with all of its faults,
defines a routine that eventually halts.

You feed in your program, with suitable data,


and P gets to work, and a little while later
(in finite compute time) correctly infers
whether infinite looping behavior occurs.

If there will be no looping, then P prints out ‘Good.’


That means work on this input will halt, as it should.
But if it detects an unstoppable loop,
then P reports ‘Bad!’ — which means you’re in the soup.

Well, the truth is that P cannot possibly be,


because if you wrote it and gave it to me,
I could use it to set up a logical bind
that would shatter your reason and scramble your mind.

Here’s the trick that I’ll use — and it’s simple to do.
I’ll define a procedure, which I will call Q,
that will use P’s predictions of halting success
to stir up a terrible logical mess.

For a specified program, say A, one supplies,


the first step of this program called Q I devise
is to find out from P what’s the right thing to say
of the looping behavior of A run on A.

Geoffrey K. Pullum, “Scooping the Loop Snooper: a proof that the halting problem is undecidable.” Mathematics Magazine, October 2000. Copyright Mathematics
Magazine. Article provided by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.lel.
ed.ac.uk/~gpullum/loopsnoop.html.
7 SCOOPING THE LOOP SNOOPER: A PROOF THAT THE HALTING PROBLEM IS UNDECIDABL

If P’s answer is ‘Bad!’, Q will suddenly stop.


But otherwise, Q will go back to the top,
and start off again, looping endlessly back,
till the universe dies and turns frozen and black.

And this program called Q wouldn’t stay on the shelf;


I would ask it to forecast its run on itself.
When it reads its own source code, just what will it do?
What’s the looping behavior of Q run on Q?

If P warns of infinite loops, Q will quit;


yet P is supposed to speak truly of it!
And if Q’s going to quit, then P should say ‘Good.’
Which makes Q start to loop! (P denied that it would.)

No matter how P might perform, Q will scoop it:


Q uses P’s output to make P look stupid.
Whatever P says, it cannot predict Q:
P is right when it’s wrong, and is false when it’s true!

I’ve created a paradox, neat as can be —


and simply by using your putative P.
When you posited P you stepped into a snare;
Your assumption has led you right into my lair.

So where can this argument possibly go?


I don’t have to tell you; I’m sure you must know.
A reductio: There cannot possibly be
a procedure that acts like the mythical P.

You can never find general mechanical means


for predicting the acts of computing machines;
it’s something that cannot be done. So we users
must find our own bugs. Our computers are losers!

In October 2000, after a refereeing delay of nearly a year, an earlier and incorrect version of this poetic proof was published in Mathematics
Magazine (73, no. 4, 319–320). But it had an error. I am very grateful to Philip Wadler (Informatics, University of Edinburgh) and Larry
Moss (Mathematics, Indiana University) for helping with the development of this corrected version, which is now free of bugs (trust me;
you can check it). Thanks also to the late Dr. Seuss for the style, and of course to the pioneering work of Alan Turing (and Martin Davis’s
nice simplified presentation) for the content. Copyright © 2008 by Geoffrey K. Pullum. Permission is hereby granted to reproduce or
distribute this work for non-commercial, educational purposes relating to the teaching of computer science, mathematics, or logic, provided
this attribution is included.

Geoffrey K. Pullum, “Scooping the Loop Snooper: a proof that the halting problem is undecidable.” Mathematics Magazine, October 2000. Copyright Mathematics
Magazine. Article provided by Library Reserves for private study, scholarship, or research. Do not redistribute. This article can also be found at http://www.lel.
ed.ac.uk/~gpullum/loopsnoop.html.

You might also like