EFTA02435672.pdf
PDF Source (No Download)
Extracted Text (OCR)
To:
Jeffrey Epsteinfleevacationagmail.comj
From:
Corina Tamita
Sent
Sat 11/21/2009 5:22:18 PM
Subject: Re:
i see your point.
look more into signal-to-noise. i have to learn a bit about its use in cell
signaling.
On Sat, Nov 21, 2009 at 5:20 AM, Jeffrey Epstein <jeevacationagmail.com> wrote:
we should look at signal to noise.. for example if the channel was noisy it would make sense
to make a multiple copy of the agent. it could simply be repetition. then an error checking bit,
then an encoding , I think the great mystery now is that Socrates appears to have been wrong.
His maxim of " Know thyself " , might let predators also know you , and destroy or hijack you
with less effort.
On Sat, Nov 21, 2009 at 2:03 AM, Corina Tamita
wrote:
hi jeffrey, i don't know if martin already told you about this but here's something that might
validate your DNA hypothesis: if you play repeated games with memory 1 (you remember the
opponent's last move), a winning strategy is Tit-For-Tat. you can think of such strategies as
finite state automata. if you make an evolutionary process where these automata can evolve
and grow as large as they want (hence producing more and more sophisticated strategies),
and if you look for winners you will see that often TFT is still a winning strategy.
but what changes is that the newer TFTs arc encoded by longer and longer automata (same
strategy, just given by more complicated automata). but more interestingly, i think it takes
much longer to invade a longer TFT than a short one. this would mean that it makes sense to
have more junk there -- it certainly seems inefficient to produce an automaton with 50 states
that encodes a strategy which could be given with 2 states. but it's not that stupid; all that
"junk" seems to protect against invasion. we're investigating this now. thought you might like
to know.
hope you're well,
coma
**************************************
*********************
The information contained in this communication is
confidential, may be attorney-client privileged, may
constitute inside information, and is intended only for
the use of the addressee. It is the property of
Jeffrey Epstein
Unauthorized use, disclosure or copying of this
communication or any part thereof is strictly prohibited
and may be unlawful. If you have received this
EFTA_R1_01507816
EFTA02435672
communication in error, please notify us immediately by
return e-mail or by e-mail to leevacation@gmail.com and
destroy this communication and all copies thereof,
including all attachments.
EFTA_R1_01507817
EFTA02435673
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Email Addresses
Document Details
| Filename | EFTA02435672.pdf |
| File Size | 141.9 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 2,610 characters |
| Indexed | 2026-02-12T16:59:03.187920 |