Poincaré, Henri,
9.1
,
12.1
polarization states,
13.1
,
13.2
Pope, Alexander
Porsche
Preece, William
Preskill, John,
13.1
,
13.2
Prime Computer
prime numbers,
12.1
,
12.2
,
13.1
Primrose, Frank
Prince
Princeton University,
6.1
,
6.2
,
6.3
Principia Mathematica
(Russell, Whitehead),
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
6.6
,
6.7
Principles of Psychology
(James)
Printing Press as an Agent of Change, The
(Einstein)
printing technology,
prl.1
,
3.1
,
4.1
,
4.2
,
15.1
,
15.2
,
15.3
probability
calculations for control of redundancy in messages,
7.1
,
7.2
in measurement of information,
7.1
,
7.2
,
7.3
,
8.1
,
12.1
as problem for quantum computing,
13.1
,
13.2
qualities of randomness and
statistical analysis of language,
7.1
,
7.2
,
7.3
,
7.4
in stochastic processes
in thermodynamics,
9.1
,
9.2
,
9.3
,
9.4
Turing’s ban unit of,
7.1
,
7.2
Problems of Information Transmission,
12.1
,
12.2
programming
to generate random numbers,
12.1
,
12.2
Lovelace’s operations for Analytical Engine as,
4.1
,
4.2
of Turing machine states,
7.1
,
7.2
,
7.3
,
8.1
,
12.1
,
12.2
proteins,
10.1
,
10.2
,
10.3
,
10.4
,
10.5
,
10.6
,
10.7
pseudorandom numbers
psyche
Psycho-Acoustic Laboratory
psychology,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
8.7
,
8.8
,
8.9
Pulgram, Ernst
quadratic equations
quantum information science
computing based on,
13.1
,
13.2
,
13.3
,
13.4
conceptual basis,
13.1
,
13.2
,
13.3
,
13.4
entanglement in,
prl.1
,
13.1
,
13.2
,
13.3
,
13.4
first encoded message based on,
13.1
,
13.2
,
13.3
future applications of
measurement units in,
13.1
,
13.2
problem of black holes in,
13.1
,
13.2
,
13.3
scope of,
prl.1
,
prl.2
Shannon’s contribution to,
13.1
,
13.2
superposition principle in
quantum physics
of black holes
complementarity concept in
conflicting theories in,
13.1
,
13.2
entanglement
incompleteness theorem and,
12.1
,
12.2
see also
quantum information science
Quastler, Henry
qubits,
prl.1
,
13.1
,
13.2
,
13.3
,
13.4
,
13.5
queuing theory
Quittner, Joshua
Ramanaujan, Srinivasa
randomness
Chaitin’s insight
coded data disguised by
complexity perceived as,
12.1
,
12.2
computability and,
12.1
,
12.2
,
12.3
computer programs to generate,
12.1
,
12.2
data compression and,
12.1
,
12.2
definition of
frequency of, among numbers
information-carrying capacity of
interesting numbers and,
12.1
,
12.2
mathematical proof of,
12.1
,
12.2
in quantum cryptography
recognition of,
12.1
,
12.2
,
12.3
statistical normality in
tables of random numbers,
7.1
,
12.1
,
12.2
Ratio Club,
8.1
,
8.2
Rattray, Robert Sutherland,
1.1
,
1.2
Ratzenberger, Caspar,
14.1
,
14.2
Rayleigh, Lord
“recoding” of information,
8.1
,
8.2
recordings,
2.1
,
5.1
,
5.2
,
12.1
,
12.2
,
12.3
,
14.1
,
14.2
recursive procedures
in algorithmic proof of randomness,
12.1
,
12.2
in Lovelace’s operations for Analytical Engine
paradoxes based on,
6.1
,
6.2
in Turing machine operations,
7.1
,
7.2
in use of alphabetical ordering systems
redundancy
control of, for communication,
7.1
,
7.2
in English language,
1.1
,
1.2
,
7.1
,
7.2
,
8.1
,
8.2
,
8.3
in genetic code
information content and
in language of talking drums,
1.1
,
1.2
mathematical modeling of
in oral literature
predictability and,
7.1
,
7.2
,
8.1
,
12.1
to prevent telegraph errors
quantifying, in measurement of information,
7.1
,
7.2
in quantifying message value
role of, in language,
1.1
,
1.2
,
7.1
significance of, in cryptanalysis
Regiomontanus
relays, electrical,
5.1
,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
7.1
,
8.1
,
8.2
,
8.3
“Reliable Circuits Using Less Reliable Relays” (Shannon)
Reuss, Christoph
Revere, Paul,
1.1
,
7.1
rhyme
rhythm
ribosomes
RNA,
10.1
,
10.2
,
10.3
,
11.1
,
13.1
,
13.2
RNA Tie Club,
10.1
,
10.2
Roget, Peter
Romme, Gilbert
Roosevelt, Franklin D.,
prl.1
,
prl.2
,
7.1
Rosen, Nathan
Ross, Alex
RSA encryption
Russell, Bertrand,
5.1
,
5.2
,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
7.1
,
8.1
,
8.2
,
12.1
Russell’s paradox,
6.1
,
6.2
,
12.1
Safire, William,
3.1
,
11.1
Sagan, Carl
sampling,
6.1
,
6.2
,
7.1
,
7.2
,
12.1
Sapir, Edward
Savage, Leonard,
8.1
,
8.2
Schilling, Pavel
Schrödinger, Erwin,
9.1
,
10.1
,
10.2
,
13.1
science
as algorithmic process,
12.1
,
12.2
data compression in laws of
evolution of language for development of,
3.1
,
3.2
,
3.3
limits to knowledge in,
12.1
,
12.2
in Soviet Union
see also specific discipline
science fiction,
epl.1
,
epl.2
Scientific American,
5.1
,
6.1
,
7.1
,
8.1
,
8.2
,
11.1
,
12.1
Scott, E. Erskine
search engines,
15.1
,
epl.1
,
epl.2
,
epl.3
second law of thermodynamics,
8.1
,
9.1
,
9.2
,
9.3
,
9.4
,
9.5
Secret Corresponding Vocabulary, The
(Smith)
self-awareness,
prl.1
,
2.1
,
2.2
,
2.3
,
2.4
Selfish Gene, The
(Dawkins),
10.1
,
11.1
,
11.2
selfish genes,
10.1
,
10.2
,
10.3
,
10.4
,
11.1
self-organizing systems
self-referencing,
6.1
,
6.2
,
6.3
,
7.1
,
7.2
self-replication
as ability of living organisms
of chain letters,
11.1
,
11.2
,
11.3
crystal capacity for
disease analogy,
11.1
,
11.2
DNA
machine,
8.1
,
8.2
as mission of genes,
10.1
,
10.2
,
10.3
,
10.4
,
10.5
,
10.6
,
10.7
through imitation
see also
meme(s)
semiconductor
sensory processing
server farms,
11.1
,
14.1
set theory,
6.1
,
6.2
Shaffner, Taliaferro
Shakespeare, William,
3.1
,
3.2
Shannon, Betty Moore,
7.1
,
7.2
Shannon, Catherine Wolf
Shannon, Claude,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
13.1
ballistics research of,
6.1
,
6.2
at Bell Labs,
prl.1
,
prl.2
,
6.1
,
7.1
,
7.2
,
7.3
,
7.4
,
7.5
in Conference on Cybernetics,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
8.7
,
8.8
cryptography work of,
prl.1
,
prl.2
,
6.1
,
6.2
,
6.3
,
7.1
,
7.2
,
7.3
,
7.4
,
7.5
,
7.6
,
7.7
data compression studies of,
prl.1
,
prl.2
,
12.1
,
12.2
,
12.3
early life and education,
6.1
,
6.2
,
6.3
,
6.4
early studies in symbolic logic,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
information storage studies of,
7.1
,
7.2
Kolmogorov and,
12.1
,
12.2
master’s thesis of,
6.1
,
6.2
,
6.3
maze-navigating machine of,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
on meaning in messages,
prl.1
,
7.1
measurement of information by,
prl.1
,
6.1
,
6.2
,
9.1
,
9.2
,
14.1
at MIT,
prl.1
,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
6.6
,
6.7
,
6.8
,
8.1
,
12.1
at Princeton,
6.1
,
6.2
quantum information science and,
13.1
,
13.2
statistical analysis of language by,
7.1
,
7.2
,
7.3
,
7.4
study of redundancy in language by,
1.1
,
1.2
,
7.1
,
7.2
theory of information,
prl.1
,
prl.2
,
prl.3
,
7.1
,
7.2
,
7.3
,
7.4
,
7.5
,
7.6
,
7.7
,
7.8
,
7.9
,
7.10
,
7.11
,
7.12
,
7.13
,
8.1
,
8.2
,
8.3
on thinking machines,
8.1
,
8.2
Turing machine analysis by
Wiener and,
8.1
,
8.2
,
8.3
,
8.4
,
8.5
,
8.6
,
9.1
,
9.2
work with Differential Analyzer,
6.1
,
6.2
,
6.3
Shannon, Mabel Catherine Wolf
Shannon, Norma Levor,
6.1
,
6.2
,
6.3
Shannon entropy,
7.1
,
7.2
,
10.1
,
10.2
Shannon-Fano coding
Shannon limit
Shaw, George Bernard
Shockley, William
Shor, Peter,
13.1
,
13.2
signal distortion;
see
noise
signals and signaling
Babbage’s occulting light for
brain function as
fire beacons
historical evolution of,
1.1
,
1.2
lighthouses
nature of telephone communication,
6.1
,
6.2
,
6.3
,
6.4
,
6.5
,
6.6
in neurological disorders
power of writing,
2.1
,
2.2
in telegraphy before electricity,
5.1
,
5.2
,
5.3
,
5.4
,
5.5
,
5.6
in telegraphy before Morse code,
5.1
,
5.2
,
5.3
,
5.4
,
5.5
for telephone switching,
6.1
,
6.2
see also
Morse code
signal-to-noise ratio,
8.1
,
8.2
,
15.1
Simpson, John,
3.1
,
3.2
,
3.3
,
3.4
,
3.5