• Home
  • Michael Stephen Fiske
Michael Stephen Fiske

Michael Stephen Fiske
AEMEA Institute · Mathematics & Computational Science

Ph.D. Mathematics

About

24
Publications
4,036
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
16
Citations
Introduction
I am currently developing methods that use a principle of self-modifiability and quantum physics to enhance computation. Some of this work pertains to the Active Element Machine. I’m also exploring quantum physics: applying self-modifiable differential equations to the problem of hidden variables; chemical bonds; and energy transitions of electrons in the atom seems quite promising.
Education
September 1992 - December 1996
Northwestern University
Field of study
  • Mathematics

Publications

Publications (24)
Conference Paper
Full-text available
Malware plays a key role in attacking critical infrastructure. With this problem in mind, we introduce systems that heal from a broader perspective than the standard digital computer model: Our goal in a more general theory is to be applicable to systems that contain subsystems that do not solely rely on the execution of register machine instructio...
Conference Paper
Full-text available
Recent research has demonstrated electronic hardware attacks on pacemakers and insulin injectors. Injecting clock glitches can skip cryptographic instructions, defeating the security of the executing instructions. Typically, these attacks destabilize the dynamical behavior of the electronics. For over 70 years, flip-flops have been a fundamental b...
Data
"Dynamical Systems that Heal” was awarded Best Paper at HICSS-56. Our primary contribution defines a principle of self-modifiability in dynamical systems and demonstrates how it can be used to heal a malfunctioning dynamical system. As far as we know, to date there has not been a mathematical notion of self-modifiability in dynamical systems; hit...
Conference Paper
Full-text available
Malware plays a critical role in breaching computer systems. The computing behavior of a register machine program can be sabotaged, by making a very small change to the original, uninfected program. Stability has been studied extensively in dynamical systems and in engineering. Our primary contribution introduces a computing machine that is structu...
Conference Paper
Full-text available
Malware plays a critical role in breaching computer systems. Cybersecurity research has primarily focused on malware detection. Detection methods are currently up against fundamental limits in theoretical computer science. The purpose of visual image authentication is to create Artificial Intelligence (AI) problems that are easy for humans to under...
Chapter
A new computational model, called the ex-machine, executes standard instructions, meta instructions, and random instructions. Standard instructions behave similarly to machine instructions in a digital computer. Meta instructions self-modify the ex-machine’s program during its execution. We construct a countable set of ex-machines; each can compute...
Preprint
Full-text available
Our goal is to construct mathematical operations that combine indeterminism measured from quantum randomness with computational determinism so that non-mechanistic behavior is preserved in the computation. Formally, some results about operations applied to computably enumerable (c.e.) and bi-immune sets are proven here, where the objective is for t...
Conference Paper
Full-text available
Malware plays a significant role in breaching computer systems. Previous research has focused on malware detection even though detection is up against theoretical limits in computer science and current methods are inadequate in practice. We explain the susceptibility of computation to malware as a consequence of the instability of Turing and regist...
Preprint
Full-text available
Physical implementations of digital computers began in the latter half of the 1930's and were first constructed from various forms of logic gates. Based on the prime numbers, we introduce prime clocks and prime clock sums, where the clocks utilize time and act as computational primitives instead of gates. The prime clocks generate an infinite abeli...
Preprint
Full-text available
Among the fundamental questions in computer science, at least two have a deep impact on mathematics. What can computation compute? How many steps does a computation require to solve an instance of the 3-SAT problem? Our work addresses the first question, by introducing a new model called the ex-machine. The ex-machine executes Turing machine instru...
Chapter
Full-text available
Physical implementations of digital computers began in the latter half of the 1930's and were first constructed from various forms of logic gates. Based on the prime numbers, we introduce prime clocks and prime clock sums, where the clocks utilize time and act as computational primitives instead of gates. The prime clocks generate an infinite abeli...
Conference Paper
Full-text available
The notion of key generators is introduced to symmetric cryptography. Key generators help eliminate the dependence of a block cipher's security on a single, static key. If one of the dynamic keys is leaked to the adversary, then this compromise does not reveal future keys and prior keys used by the block cipher to encrypt distinct blocks of plainte...
Patent
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment,...
Patent
An active element machine is a new kind of computing machine. When implemented in hardware, the active element machine can execute multiple instructions simultaneously, because every one of its computing elements is active. This greatly enhances the computing speed. By executing a meta program whose instructions change the connections in a dynamic...
Conference Paper
Full-text available
In [4], a computational procedure (Procedure 2) - combining quantum randomness and the active element machine (AEM) [5] - executes a universal Turing machine with Turing incomputable firing patterns. The procedure emulates any digital computer program so its computational steps are incomprehensible to an external observer. This procedure’s purpose...
Chapter
Full-text available
The Turing machine is studied with new methods motivated by the notion of recurrence in classical dynamical systems theory. The state cycle of a Turing machine is introduced. It is proven that each consecutive repeating state cycle in a Turing machine determines a unique periodic configuration (point) and vice versa. This characterization is a peri...
Article
A new computing machine, called an active element machine (AEM), and programming language is presented. This computing model is motivated by the positive aspects of dendritic integration, inspired by biology, and traditional programming lan-guages based on the register machine. Distinct from the traditional register machine, the fundamental computi...
Conference Paper
Full-text available
New methods are presented for the machine recognition and learning of categories, patterns, and knowledge. A probabilistic machine learning algorithm is described that scales favorably to extremely large datasets, avoids local minima problems, and provides fast learning and recognition speeds. Templates may be created using an evolutionary algorith...
Conference Paper
Full-text available
A new computing model, called the active element machine (AEM), is presented that demonstrates Turing incomputable computation using quantum random input. The AEM deterministically executes a universal Turing machine (UTM) program η with random active element firing patterns. These firing patterns are Turing incomputable when the AEM executes a UTM...
Chapter
Full-text available
A new computing machine, called an active element machine (AEM), and programming language is presented. This computing model is motivated by the positive aspects of dendritic integration, inspired by biology, and traditional programming languages based on the register machine. Distinct from the traditional register machine, the fundamental computin...
Article
Full-text available
This paper demonstrates a sequence of natural numbers that grows faster than any Turing computable function. This sequence is generated from a version of the tiling problem, called a coloring system. In our proof that generates the sequence, we use the notions of a chain and the unbounded sequence property, which resemble the methods of point set t...
Article
We present new results about the dynamical behavior of Turing Machines. We define a transformation φ that creates a one-to-one correspondence from the Turing machine program rules to a finite set of two dimensional (x-y plane) affine maps, where the domain of each affine map is a distinct unit square. This transformation characterizes the computing...
Article
Full-text available
Thesis (Ph. D., Mathematics)--Northwestern University, 1996.