I may be technically wrong and technically right about this. An
encryption will often (if not usually) expand the data, so an
encrypted database would not technically be a compression. However, an
AGI program would typically need to encode some central subject matter
so that it could be used in a variety of ways. So this might be seen
as an expansion of the central subject matter that might be referenced
for some particular purpose but the expanded data might stand as a
compression for all the ways the subject matter could be used. So the
data would not be compressed relative to just the central subject
under consideration but it would be compressed relative to the variety
of ways that subject data might be used. If these methods included
transformational methods which could be used to 'calculate' the
results based on various ways that interrelated data might be used
then the system might be able to run these transformational
'calculations' without unencrypting or decompressing the data. These
'calculations' would not typically be comprised of standard
contemporary numerical calculations.

I keep thinking of virtual networks of cross-generalizations. Each
generalization path might represent a compression along some line from
generalization to particularization. However, if the generalization
node could also be referenced from other levels which were related to
the generalization node, then the system might both be seen as an
expansion of any one node but a compression of the potential of the
entire system.

Inventing new kinds of mathematical systems along which could be used
across the systems and across different compressions is going to be
difficult. Well, it probably isn't that difficult to create simple
prototypes of such systems but it will probably be difficult to create
effective systems.
Jim Bromer


On Sat, Nov 29, 2014 at 12:52 PM, Jim Bromer <[email protected]> wrote:
> A slightly modified statement about Compression Transformation that I
> made in The role of prediction [was What's preventing me...]
> http://www.jimbromer.com/TheNeedForTransformationalCompressions.html
>
> A simple example from MIT is given about using an encrypted database
> to make queries without first decrypting it.
>
> Processing Queries over Encrypted Databases
> can be found on page 13 of
> http://www.eecs.mit.edu/docs/newsletter/connector2014.pdf
>
> Jim Bromer


-------------------------------------------
AGI
Archives: https://www.listbox.com/member/archive/303/=now
RSS Feed: https://www.listbox.com/member/archive/rss/303/21088071-f452e424
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=21088071&id_secret=21088071-58d57657
Powered by Listbox: http://www.listbox.com

Reply via email to