{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:51:40Z","timestamp":1777593100101,"version":"3.51.4"},"reference-count":61,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T00:00:00Z","timestamp":1353542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>We survey a few aspects of the thermodynamics of computation, connecting information, thermodynamics, computability and physics. We suggest some lines of research into how information theory and computational thermodynamics can help us arrive at a better understanding of biological processes. We argue that while a similar connection between information theory and evolutionary biology seems to be growing stronger and stronger, biologists tend to use information simply as a metaphor. While biologists have for the most part been influenced and inspired by information theory as developed by Claude Shannon, we think the introduction of algorithmic complexity into biology will turn out to be a much deeper and more fruitful cross-pollination.<\/jats:p>","DOI":"10.3390\/info3040739","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T11:02:55Z","timestamp":1353582175000},"page":"739-750","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Information Theory and Computational Thermodynamics: Lessons for Biology from Physics"],"prefix":"10.3390","volume":"3","author":[{"given":"Hector","family":"Zenil","sequence":"first","affiliation":[{"name":"University of Sheffield, S1 4DP, UK"}]}],"member":"1968","published-online":{"date-parts":[[2012,11,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Zenil, H. (2012). A Computable Universe: Understanding Computation & Exploring Nature as Computation, World Scientific Publishing Company.","DOI":"10.1142\/8306"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1007\/BF01341281","article-title":"\u00dcber die Entropieverminderung in einem thermodynamischen System bei Eingriffenin telligenter Wesen (On the reduction of entropy in a thermodynamic system by the interference of intelligent beings)","volume":"53","year":"1929","journal-title":"Z. Physik"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1147\/rd.53.0183","article-title":"Irreversibility and heat generation in the computing process","volume":"5","author":"Landauer","year":"1961","journal-title":"IBM J. Res. Dev"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1007\/BF02084158","article-title":"The thermodynamics of computation\u2014A review","volume":"21","author":"Bennett","year":"1982","journal-title":"Int. J. Theor. Phys."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1038\/scientificamerican1187-108","article-title":"Demons, Engines and the Second Law","volume":"257","author":"Bennett","year":"1987","journal-title":"Sci. Am."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF01857727","article-title":"Conservative logic","volume":"21","author":"Fredkin","year":"1982","journal-title":"Int. J. Theor. Phys."},{"key":"ref_7","unstructured":"Pesic, P. (2001). Theory of Heat, Dover. [9th]."},{"key":"ref_8","unstructured":"Hey, J.G., and Allen, W. (1996). Feynman Lectures on Computation, Addison-Wesley."},{"key":"ref_9","unstructured":"Sethna, J. (2006). Statistical Mechanics: Entropy, Order Parameters and Complexity, Oxford University Press."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Toffoli, T. (1980). Reversible Computing; Technical memo MIT\/LCS\/TM-151, MIT Lab for Computer Science.","DOI":"10.21236\/ADA082021"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1147\/rd.176.0525","article-title":"Logical reversibility of computation","volume":"17","author":"Bennett","year":"1973","journal-title":"IBM J. Res. Dev."},{"key":"ref_12","unstructured":"Cerny, V. Energy, Entropy, Information, and Intelligence. Available online:http:\/\/arxiv.org\/pdf\/1210.7065.pdf."},{"key":"ref_13","first-page":"1","article-title":"Three approaches to the quantitative definition of information","volume":"1","author":"Kolmogorov","year":"1965","journal-title":"Probl. Inform. Transm."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1145\/321892.321894","article-title":"A Theory of Program Size Formally Identical to Information Theory","volume":"22","author":"Chaitin","year":"1975","journal-title":"J. Assoc. Comput. Mach."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0019-9958(64)90223-2","article-title":"A formal theory of inductive inference: Parts 1 and 2","volume":"7","author":"Solomonoff","year":"1964","journal-title":"Inform. Control"},{"key":"ref_16","first-page":"206","article-title":"Laws of information conservation (non-growth) and aspects of the foundation of probability theory","volume":"10","author":"Levin","year":"1974","journal-title":"Probl. Inform. Transm."},{"key":"ref_17","unstructured":"Preskill, J. Do Black Holes Destroy Information?. Available online:http:\/\/arxiv.org\/abs\/hep-th\/9209058."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4078","DOI":"10.1103\/PhysRevD.49.4078","article-title":"Comments on information loss and remnants","volume":"49","author":"Giddings","year":"1994","journal-title":"Phys. Rev. D."},{"key":"ref_19","unstructured":"Read in a presentation at the Philosophical Society of Zurich on April 24, 1865."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1038\/scientificamerican0803-58","article-title":"Information in the Holographic Universe","volume":"289","author":"Bekenstein","year":"2003","journal-title":"Sci. Am."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6377","DOI":"10.1063\/1.531249","article-title":"The World as a Hologram","volume":"36","author":"Susskind","year":"1995","journal-title":"J. Math. Phys."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1103\/RevModPhys.74.825","article-title":"The holographic principle","volume":"74","author":"Bousso","year":"2002","journal-title":"Rev. Mod. Phys."},{"key":"ref_23","unstructured":"t Hooft, G. Dimensional Reduction in Quantum Gravity. Available online:http:\/\/arxiv.org\/abs\/gr-qc\/9310026."},{"key":"ref_24","unstructured":"Zurek, E. (1990). Complexity, Entropy, and the Physics of Information, Addison-Wesley."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1063\/1.3120895","article-title":"John Wheeler, relativity, and quantum information","volume":"62","author":"Misner","year":"2009","journal-title":"Phys. Today"},{"key":"ref_26","first-page":"97","article-title":"Quantum Theory, the Church-Turing Principle, and the Universal Quantum Computer","volume":"A400","author":"Deutsch","year":"1985","journal-title":"Proc. R. Soc. Lond."},{"key":"ref_27","unstructured":"Wolfram, S. (2002). A New Kind of Science, Wolfram Media."},{"key":"ref_28","unstructured":"Dennett, D.C. (1996). Darwin\u2019s Dangerous Idea: Evolution and the Meanings of Life, Simon & Schuster."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Dodig-Crnkovic, G., and Burgin, M. (2010). Information and Computation, World Scientific.","DOI":"10.1142\/7637"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1007\/s12041-008-0064-9","article-title":"The simplest formal argument for fitness optimization","volume":"87","author":"Grafen","year":"2008","journal-title":"J. Genet."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1111\/j.1420-9101.2007.01321.x","article-title":"The formal Darwinism project: A mid-term report","volume":"20","author":"Grafen","year":"2007","journal-title":"J. Evolution. Biol."},{"key":"ref_32","unstructured":"Bittar, E.E. (1998). Developmental Biology, Elsevier."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Shetty, R.P, Endy, D., and Knight, T.F. (2008). Engineering BioBrick vectors from BioBrick parts. J. Biol. Eng., 2.","DOI":"10.1186\/1754-1611-2-5"},{"key":"ref_34","unstructured":"Adleman, L.M. (2000). Toward a Mathematical Theory of Self-Assembly, USC Technical Report."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Rothemund, P.W.K., Papadakis, N., and Winfree, E. (2004). Algorithmic Self-Assembly of DNA Sierpinski Triangles. PLoS Biol., 2.","DOI":"10.1371\/journal.pbio.0020424"},{"key":"ref_36","unstructured":"Adleman, L.M., Cheng, Q., Goel, A., and Huang, M.-D.A. Running time and program size for self-assembled squares. ACM Symposium on Theory of Computing, Crete, Greece."},{"key":"ref_37","unstructured":"Rothemund, P.W.K.;Winfree The program-size complexity of self-assembled squares (extended abstract). ACM Symposium on Theory of Computing, Portland, OR, USA."},{"key":"ref_38","unstructured":"Aggarwal, G., Goldwasser, M., Kao, M., and Schweller, R.T. Complexities for generalized models of self-assembly. Symposium on Discrete Algorithms, New Orleans, LA, USA."},{"key":"ref_39","unstructured":"Winfree, E. (1998). Algorithmic Self-Assembly of DNA Thesis. [Ph.D Thesis]."},{"key":"ref_40","unstructured":"Burks, A. (1966). The Theory of Self-reproducing Automata, University of Illinois Press."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1038\/scientificamerican1070-120","article-title":"Mathematical Games\u2014The fantastic combinations of John Conway\u2019s new solitaire game \u201clife\u201d","volume":"223","author":"Gardner","year":"1970","journal-title":"Sci. Am."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/0167-2789(86)90237-X","article-title":"Studying artificial life with cellular automata","volume":"22","author":"Langton","year":"1986","journal-title":"Physica D"},{"key":"ref_43","unstructured":"Winfree, E. (1998). Simulations of Computing by Self-Assembly; Technical Report CS-TR:1998.22, Caltech."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01556771","article-title":"Numerical testing of evolution theories Part I Theoretical introduction and basic tests","volume":"16","author":"Barricelli","year":"1961","journal-title":"Acta Biotheor."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/0022-5193(67)90097-5","article-title":"Simulation of biological evolution and machine learning. I. Selection of self-reproducing numeric patterns by data processing machines, effects of hereditary control, mutation type and crossing","volume":"17","author":"Reed","year":"1967","journal-title":"J. Theor. Biol."},{"key":"ref_46","unstructured":"Dyson, G. (1999). Darwin Among the Machines, Penguin Books Ltd."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.25088\/ComplexSystems.15.1.1","article-title":"Universality in Elementary Cellular Automata","volume":"15","author":"Cook","year":"2004","journal-title":"Complex Syst."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-642-03409-1_24","article-title":"Small weakly universal Turing machines","volume":"Volume 5699 of LNCS","author":"Neary","year":"2009","journal-title":"17th International Symposium on Fundamentals of Computation Theory (FCT 2009)"},{"key":"ref_49","unstructured":"Holland, J.H. (1975). Adaptation in Natural and Artificial Systems, University of Michigan Press."},{"key":"ref_50","unstructured":"Koza, J.R. (1992). Genetic Programming: On the Programming of Computers by Means of Natural Selection, MIT Press."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1142\/S0129183111016348","article-title":"Cellular automaton supercolliders","volume":"22","author":"Adamatzky","year":"2011","journal-title":"Int. J. Mod. Phys. C"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1073\/pnas.0510932103","article-title":"An optimal brain can be composed of conflicting agents","volume":"103","author":"Livnat","year":"2006","journal-title":"PNAS"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Zenil, H. (2011). Randomness Through Computation, World Scientific.","DOI":"10.1142\/9789814327756"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1111\/j.1600-0706.2009.17509.x","article-title":"Information is a fitness enhancing resource","volume":"119","author":"McNamara","year":"2010","journal-title":"Oikos"},{"key":"ref_55","first-page":"11","article-title":"Some Computational Aspects of Essential Properties of Evolution and Life","volume":"12","author":"Zenil","year":"2012","journal-title":"ACM Ubiquity"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"2173","DOI":"10.3390\/e14112173","article-title":"Life as Thermodynamic Evidence of Algorithmic Structure in Natural Environments","volume":"14","author":"Zenil","year":"2012","journal-title":"Entropy"},{"key":"ref_57","unstructured":"Gershenson, C., Aerts, D., and Edmonds, B. (2007). Worldviews, Science and Us: Philosophy and Complexity, World Scientfic."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Paz Flanagan, T., Letendre, K., Burnside, W., Fricke, G.M., and Moses, M. (2011). How ants turn information into food. IEEE Artificial Life (ALIFE), Paris, France.","DOI":"10.1109\/ALIFE.2011.5954650"},{"key":"ref_59","first-page":"6","article-title":"Born knowing: Tentacled snakes innately predict future prey behaviour","volume":"5","author":"Catalania","year":"2010","journal-title":"PLoS ONE"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.tree.2011.04.002","article-title":"The contribution of statistical physics to evolutionary biology","volume":"26","author":"Barton","year":"2011","journal-title":"Trends Ecol. Evol."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A Mathematical Theory of Communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/3\/4\/739\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:53:46Z","timestamp":1760219626000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/3\/4\/739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,22]]},"references-count":61,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2012,12]]}},"alternative-id":["info3040739"],"URL":"https:\/\/doi.org\/10.3390\/info3040739","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,22]]}}}