🔬

Computing

3
Open Unknowns
17
Cross-Domain Bridges
10
Active Hypotheses

Cross-Domain Bridges

Bridge Google's Sycamore quantum processor (2019) demonstrated quantum computational advantage by sampling a random quantum circuit distribution in 200s vs estimated 10,000 classical years, framing the question of quantum advantage as the complexity separation BQP vs BPP and connecting quantum entanglement physics to computational complexity theory.

Fields: Computer Science, Physics, Quantum Computing, Computational Complexity, Quantum Information

Google's 53-qubit Sycamore processor (Arute et al. 2019) sampled the output distribution of a pseudo-random quantum circuit in 200s, with classical simulation estimated at 10,000 years on Summit super...

Bridge Non-helical cavity resonators ↔ Landauer-limited reversible electromagnetic computation and memory (speculative engineering bridge)

Fields: Electromagnetism, Metamaterials, Reversible Computing, Quantum Information, Thermodynamics Of Computation

Non-helical (e.g. bifilar or meander) resonators in shielded cavities can reduce stray coupling and support high-Q modes that are attractive substrates for adiabatic or logically reversible manipulati...

Bridge Numerical Methods and Scientific Computing — finite differences, Runge-Kutta, Krylov solvers, and GPU acceleration form the computational backbone of climate models, CFD, and AI training

Fields: Mathematics, Computational Engineering, Applied Mathematics, High Performance Computing, Numerical Analysis

Scientific computing converts continuous differential equations into discrete approximations solvable by digital computers. The finite difference method (FDM) approximates spatial derivatives: ∂u/∂x ≈...

Bridge The leaky integrate-and-fire (LIF) subthreshold equation τ_m dV/dt = −(V − V_rest) + R I(t) is the same first-order linear ODE as charging a parallel RC circuit driven by current — capacitance stores charge while leak conductance provides dissipation — establishing direct electrophysiological–circuit metaphors used in neuromorphic engineering datasheets.

Fields: Computational Neuroscience, Electrical Engineering, Neuromorphic Computing

Cell membrane lipid bilayer acts as capacitance C_m per area; ion channels provide conductances g giving τ_m = C_m/g. Subthreshold LIF ignores spike-generation nonlinearities but preserves low-pass fi...

Bridge Biological neurons communicate via discrete action potentials (spikes) at ~10 fJ/spike; neuromorphic chips (Intel Loihi, IBM TrueNorth) implement spiking neural networks in silicon at 3–4 orders of magnitude lower energy than GPU inference, bridging computational neuroscience to ultra-low-power AI hardware.

Fields: Computational Neuroscience, Electrical Engineering, Neuromorphic Computing, Machine Learning

Biological neural computation uses action potentials (spikes): discrete, all-or-nothing pulses of ~100 mV amplitude and ~1 ms duration. Neurons transmit information via: 1. RATE CODING: firing rate r(...

Bridge Topological quantum error-correcting codes (Kitaev's toric code) are physically realized as Z2 lattice gauge theories whose ground states are topological phases of matter — bridging quantum information theory, condensed-matter physics, and high-energy gauge theory via the shared language of anyons, topological order, and ground-state degeneracy on non-trivial manifolds.

Fields: Quantum Information, Condensed Matter Physics, Topological Field Theory, Quantum Computing

Kitaev's toric code (2003) is simultaneously: (A) A quantum error-correcting code with macroscopic code distance, where logical qubits are encoded in global topological degrees of freedom immune t...

Bridge Thermodynamics of Computing and Energy Limits — Landauer's principle, reversible logic, neuromorphic architectures, and the brain's energy efficiency define fundamental and practical computing bounds

Fields: Physics, Computer Engineering, Thermodynamics, Neuromorphic Computing, Information Theory

Landauer's principle (1961) establishes that logically irreversible operations — those that erase information — must dissipate at least k_BT ln 2 ≈ 3×10⁻²¹ J per bit at room temperature into the envir...

Bridge Topological insulators host bulk band gaps alongside surface/edge states protected by time-reversal symmetry, characterized by the ℤ₂ topological invariant and Chern number C = (1/2π)∫_{BZ} Ω_k dk — a quantized topological invariant that predicts the quantum anomalous Hall conductance σ_xy = Ce²/h without free parameters.

Fields: Physics, Materials Science, Condensed Matter Physics, Mathematics, Quantum Computing

Topological insulators (TIs) are materials whose electronic band structure has a bulk gap (like a conventional insulator) but whose surface or edge hosts gapless, conducting states protected by time-r...

Bridge Quantum approximate optimization algorithms bridge discrete combinatorial optimization with classical surrogate warm-start and benchmarking workflows.

Fields: Quantum Computing, Computer Science, Operations Research

Established baseline literature maps QAOA-style parameterized quantum circuits onto classical optimization landscapes; related speculative analogy (deployment-dependent): classical surrogate models tr...

Bridge Quantum key distribution achieves information-theoretic security (unconditional security independent of adversary computing power) by exploiting quantum measurement disturbance, bridging quantum computing and cryptography through the quantum no-cloning theorem and Shannon's one-time pad.

Fields: Quantum Computing, Cryptography, Information Theory

BB84 quantum key distribution achieves information-theoretic security (proven secure against computationally unbounded adversaries) because any eavesdropping measurement on quantum states introduces d...

Bridge The quantum fault-tolerance threshold theorem connects quantum error correction to information theory: if the physical error rate per gate p is below a threshold p_th (typically ~1% for surface codes), arbitrarily long quantum computations can be performed reliably by concatenating error-correcting codes, with overhead growing only polylogarithmically in computation length.

Fields: Quantum Computing, Quantum Information Theory, Computer Science

For a concatenated code of level k with physical error rate p and threshold p_th, the logical error rate scales as p_L = p_th·(p/p_th)^{2^k}. Each level of concatenation doubles the exponent, so after...

Bridge Quantum stabilizer codes are the quantum analog of classical linear codes — the threshold theorem proves that fault-tolerant quantum computation is achievable when physical error rates fall below approximately 1%.

Fields: Quantum Computing, Quantum Error Correction, Classical Coding Theory, Computer Science

Quantum error correction (Shor 1995, Steane 1996) maps directly onto classical coding theory: a [[n, k, d]] quantum code encodes k logical qubits into n physical qubits with code distance d (able to c...

Bridge Continuous-time quantum walks on graphs underpin spatial-search constructions where marked vertices couple as potential shifts — embedding Grover-type quadratic speedups into Laplacian spectral geometry while preserving caveats about optimality on arbitrary graphs versus structured Johnson/hypercube families.

Fields: Quantum Computing, Quantum Information, Computer Science, Spectral Graph Theory

Childs & Goldstone showed spatial search via continuous-time quantum walk locates a marked vertex on several graph families in O(√N) time by tuning a Hamiltonian built from the graph Laplacian plus a ...

Bridge Quantum annealing replaces thermal fluctuations with quantum tunneling: the transverse-field Ising model H=-Γ(t)Σσᵢˣ - J·Σσᵢᶻσⱼᶻ maps optimization onto adiabatic quantum evolution, generalizing simulated annealing

Fields: Quantum Computing, Combinatorics, Statistical Physics

Simulated annealing (SA) solves combinatorial optimization by sampling from the Boltzmann distribution P(s) ∝ exp(-E(s)/T), decreasing T to concentrate probability on the minimum. Quantum annealing (Q...

Bridge Quantum walks generalize classical random walks by allowing quantum superposition of paths, achieving quadratically faster spreading (sigma ~ t vs t^1/2) and providing the computational primitive for quantum speedup in graph algorithms.

Fields: Quantum Computing, Probability Theory, Algorithm Theory

The discrete-time quantum walk on a line replaces the classical coin flip (probability distribution P(x,t) satisfying the diffusion equation) with a unitary coin operator C acting on a qubit; the resu...

Bridge Topological quantum computing encodes qubits in non-Abelian anyons — quasiparticle excitations of topological phases whose braiding operations implement quantum gates by exchanging particle worldlines, with error correction guaranteed topologically because qubit states are stored in the globally degenerate ground state subspace inaccessible to local perturbations

Fields: Quantum Computing, Topology, Condensed Matter

Non-Abelian anyons (e.g., Fibonacci anyons, Majorana zero modes) in 2D topological phases have a braid group representation where exchanging anyons i and j applies a unitary gate U(σ_ij) on the degene...

Bridge Topological insulators are materials with insulating bulk but conducting surface states protected by time-reversal symmetry — classified by topological invariants (Z₂, Chern number) from algebraic topology applied to electronic band theory, with applications to fault-tolerant quantum computing via Majorana edge modes.

Fields: Quantum Physics, Condensed Matter Physics, Materials Science, Algebraic Topology, Quantum Computing

Topological insulators (TIs) are a phase of matter where the bulk band structure has a non-trivial topological invariant, even though the material is an insulator in the bulk. The topological invarian...

Open Unknowns (3)

Unknown Do genetic and evolutionary algorithms converge via the continuous-time replicator dynamics of evolutionary game theory? u-evolutionary-algorithms-replicator-dynamics
Unknown What is the universality class of the grokking phase transition, and does it match any known universality class in statistical physics? u-grokking-criticality-universality-class
Unknown Is spike-timing-dependent plasticity (STDP) the biological mechanism by which cortical networks self-organize to the SOC critical point? u-stdp-criticality-mechanism

Active Hypotheses

Hypothesis Chern-Simons gauge theory at level k provides the mathematical framework for topological quantum computation via anyons in the fractional quantum Hall state at filling fraction nu = 1/(2k+1), and the non-Abelian case (nu = 5/2) supports universal quantum gates through braiding operations that are exponentially protected from local decoherence. high
Hypothesis Tanner graph spectral gap is a stronger predictor of LDPC code threshold performance under belief propagation than variable or check node degree distributions alone, and codes constructed from Ramanujan graphs achieve belief propagation thresholds within 0.1 dB of the Shannon limit. high
Hypothesis The Feigenbaum universality of period-doubling routes to chaos (δ ≈ 4.669, α ≈ 2.502) extends to quantum maps via the quantum-classical correspondence: quantized versions of the logistic map and the Hénon map exhibit the same universal period-doubling ratios in the semiclassical limit (ℏ → 0, N_eff → ∞), with quantum corrections suppressed as O(ℏ) relative to classical universal behavior. medium
Hypothesis Grokking is a second-order phase transition in the Ising universality class, detectable via finite-size scaling of hidden-layer intrinsic dimension high
Hypothesis Neuromorphic hardware implementation of the Drosophila central complex ring attractor on Intel Loihi 2 will achieve dead-reckoning accuracy within 10% of biological ants while consuming <1 mW power, outperforming conventional IMU-based navigation at equivalent energy budgets medium
Hypothesis For noisy CTQW spatial-search simulations on hardware-motivated irregular graphs, empirical hitting-time plateaus correlate with normalized Laplacian spectral gaps extracted from the connectivity adjacency — falsified if gap estimates explain less than 40% of variance across randomized disorder draws at fixed N. medium
Hypothesis CRYSTALS-Kyber's current parameter sets (Kyber-512, Kyber-768, Kyber-1024) provide quantum security margins of approximately 108, 178, and 240 bits respectively against the best known quantum lattice sieving algorithms — sufficient for the 128/192/256-bit classical security targets — but these estimates may decrease by 10-30 bits as quantum algorithms mature in the next decade. high
Hypothesis NIST-standardized lattice-based post-quantum cryptographic algorithms (CRYSTALS-Kyber, CRYSTALS-Dilithium) will be deployed in > 50% of new TLS connections by 2028 and provide adequate security against harvest-now- decrypt-later attacks if migration begins by 2025, but systems with > 10-year confidentiality requirements are already at significant risk from data harvested before migration. critical
Hypothesis Majorana zero modes in semiconductor-superconductor nanowire devices provide topological protection that extends qubit coherence time by at least one order of magnitude compared to conventional superconducting qubits operating at the same temperature, provided the topological gap exceeds 100 μeV and the system length exceeds 5 coherence lengths critical
Hypothesis Neuromorphic chips implementing spiking neural networks will achieve 100–1000× lower energy per inference than GPU-based neural networks for always-on edge AI tasks (keyword spotting, gesture recognition, anomaly detection) while maintaining competitive accuracy, making them the dominant architecture for IoT sensing applications by 2030 high

Know something about Computing? Contribute an unknown or hypothesis →

Generated 2026-05-10 · USDR Dashboard