I may be technically wrong and technically right about this. An encryption will often (if not usually) expand the data, so an encrypted database would not technically be a compression. However, an AGI program would typically need to encode some central subject matter so that it could be used in a variety of ways. So this might be seen as an expansion of the central subject matter that might be referenced for some particular purpose but the expanded data might stand as a compression for all the ways the subject matter could be used. So the data would not be compressed relative to just the central subject under consideration but it would be compressed relative to the variety of ways that subject data might be used. If these methods included transformational methods which could be used to 'calculate' the results based on various ways that interrelated data might be used then the system might be able to run these transformational 'calculations' without unencrypting or decompressing the data. These 'calculations' would not typically be comprised of standard contemporary numerical calculations.
I keep thinking of virtual networks of cross-generalizations. Each generalization path might represent a compression along some line from generalization to particularization. However, if the generalization node could also be referenced from other levels which were related to the generalization node, then the system might both be seen as an expansion of any one node but a compression of the potential of the entire system. Inventing new kinds of mathematical systems along which could be used across the systems and across different compressions is going to be difficult. Well, it probably isn't that difficult to create simple prototypes of such systems but it will probably be difficult to create effective systems. Jim Bromer On Sat, Nov 29, 2014 at 12:52 PM, Jim Bromer <[email protected]> wrote: > A slightly modified statement about Compression Transformation that I > made in The role of prediction [was What's preventing me...] > http://www.jimbromer.com/TheNeedForTransformationalCompressions.html > > A simple example from MIT is given about using an encrypted database > to make queries without first decrypting it. > > Processing Queries over Encrypted Databases > can be found on page 13 of > http://www.eecs.mit.edu/docs/newsletter/connector2014.pdf > > Jim Bromer ------------------------------------------- AGI Archives: https://www.listbox.com/member/archive/303/=now RSS Feed: https://www.listbox.com/member/archive/rss/303/21088071-f452e424 Modify Your Subscription: https://www.listbox.com/member/?member_id=21088071&id_secret=21088071-58d57657 Powered by Listbox: http://www.listbox.com
