Research into Computational Science and Mathematics
Genuine revolution in Computing, moving past von Neumann and Harvard models into combinatorially-accessible realms of universal computers, which are much more efficient and securable than our current, long-since-stagnated popular computational mathematics and technologies. Separately, another project that is also an evolution in Formal Logics.
Current publicly-visible projects:
I'm currently focusing my funding efforts on the Ternary Instruction Set Computer project.
“ ...and perhaps the symmetric properties and simple arithmetic of this number system will prove to be quite important someday — when the ‘flip-flop’ is replaced by a ‘flip-flap-flop.’"
– Donald Knuth; Art of Computer Programming, Volume 2: Seminumerical Algorithms, 3rd Edition, Section 4.1
Energy headroom is gone – modern CMOS scaling flat-lined; balanced-ternary arithmetic can cut switching events by up to 35% in arithmetic units and DRAM accesses, a saving recently confirmed in optical-ternary optimisation experiments. cf. nature.com
AI workloads favor 3-value weights – ternary neural networks (TNNs) already outperform binary networks at the same power budget; the xTern ISA extension shows 57% better energy-efficiency on RISC-V cores with only 0.9% silicon overhead. cf. arxiv.org
Neuromorphic inspiration – SpiNNaker 2’s multi-valued routing proved that extra voltage levels unlock massive fan-out for brain-scale models. cf. tomshardware.com
Fabrication is ready – 3-D DRAM road-maps point to vertical cell arrays that are naturally addressed by TISC’s 3-D memory model and can better take advantage of TISC's 27-dimensional memory bandwidth. cf. newsroom.lamresearch.com
Security can be built-in – capability machines such as Cheri or Zeno eliminate whole classes of memory exploits at hardware level. TISC also makes use of capabilities. cf. arxiv.org
| Classical CPU | TISC innovations |
|---|---|
| Flat, address-based RAM |
Hierarchical, 26-connected 3-D Memory, allowing for typical 27-dimensional memory access; triplicated into Data, Behavior, & Control spaces for cache-friendly locality and instant control-code-data separation. |
| Program counter & registers |
4-D Cursors (3D + Time) move through space instead of shuffling data, cutting traffic and enabling dataflow scheduling. |
| Von-Neumann pipeline |
Separate Control from Behavior and Data constrains the mode of Computation even more than a Harvard architecture does, leaving ample room for static and dynamic guarantees and radical optimizations. |
| Paged MMU |
Region-&shape-aware memory with compile-time safety; draws on decades of region-based analysis to end use-after-free bugs, and trivial alias analysis. |
| Ad-hoc privilege rings | Fine-grained capability tickets enforced in HW for zero-copy, zero-trust sharing. 5 medium-grained Rings tailored to particular levels of the Computation model. 3 coarse-grained separate Memory Spaces; for Data, Behaviors, and Control. |
While not specifically designed with ANNs in mind, the architecture lends itself very well to this currentlly-hot area given its HPC goals. Besides better FMA and ternary multipliers as noted above:
Sparse-aware dataflow – TISC’s cursor moves instead of gathers, ideal for the pointer-heavy graphs of GNNs and transformer attention.
Edge-ready – The 2025 Edge-AI Technology Report highlights ultra-low-power TNN inference as a top industry priority, a sweet-spot for TISC evaluation boards. cf. ceva-ip.com
All “IP” licensing is layered with the Defensive Patent License. Idris2 (and possibly Coq), Racket/Redex, C/++, and Gem5 code and proofs will be FOSS, under an AGPLv3+-esque license. Hardware RTL/layout will also be FOSS, under a CERN OHL-v2-S-esque license. Until the Imperial Powers end and/or a better-accepted global structure than the UN emerges, both are additionally subject to the Hippocratic License 2.1.
This means: zero licence fees, maximum academic visibility, and no room for rent-seeking intermediaries.
|
Milestone |
Timeline |
Funding Needs |
Deliverables |
|
Ternary Abstract Machine |
Ongoing |
1 person (myself) & In-kind |
The documentation, Idris2 code, some proofs, and IEEE & arXiv papers (submitted to journals and conferences) |
|
Formal Abstract Machine |
9-18 months |
1 person (myself) |
Idris2 code & proofs, Redex executable spec, and visualizability/ies |
|
Conformal (Semi-Abstract) Machine |
12-30 months |
1+ person(s) |
Idris2 code & proofs, Racket code, and another Redex executable spec |
|
Virtual Architecture & |
18-36 months |
>1 persons |
Gem5 model, low-level metrics, and C/++ glue |
|
Virtual Machine |
12-18 months |
1+ person(s) |
VN & Harvard-compatible binary implementation |
|
{Stretch Goal} |
2+ years |
>1 persons |
Synthesizable core on FPGA (likely written in (abstracted) Chisel). |
I'm Alex Márquez Pérez, a mathematician by vocation, computer scientist and formal semanticist by training, and software engineer by trade. I've over a decade of experience blending deep practical expertise with scholarly rigor in programming languages and computer architecture. My industrial career includes impactful roles at Google and Microsoft where I've implemented theory into robust, production-ready systems—such as migrating Android's build infrastructure to Bazel or developing a soft-real-time embedded OS for military-grade communications.
Before my industry work, my academic path has been even more rigorous and impact‑driven. As a doctoral researcher at Northeastern University, I investigated static analysis, verified compilers, and temporal logics for a DARPA‑funded Android‑security project, while also teaching Fundamentals under Dr. Matthias Felleisen. Before that, I completed both my master’s and two bachelors' degrees in Computer Science at Georgia Tech—graduating from the inaugural Honors Program—where my theses spanned programming‑language design and machine‑learning‑driven AI. During my graduate tenure, I joined the DARPA UHPC (Ubiquitous High Performance Computing) initiative, creating Cetus‑UHPC, a source‑to‑source analysis framework that yields algebraic metrics for next‑generation HPC architectures. Earlier still, as an undergraduate researcher I co‑developed AFABL, a reinforcement‑learning‑backed language for agent‑based simulations, laying the groundwork for my continuing interest in formally verified, adaptive systems. I'm proficient across multiple languages — such as C, C++, Scala, Python, Idris2, and Racket — and I actively engage in open-source contributions.
My academic foundations reinforced my specialization in static analysis, compiler verification, and high-performance computing—knowledge I'm directly channeling into my current project, the Ternary Instruction-Set Computer (TISC). This project is being meticulously documented and is being coded with proofs for formal verifications.
My commitment to rigorous documentation, practical implementations, and transparency ensures that every investment in TISC directly translates into verifiable milestones, robust tooling, and openly shared results. Supporting my research means backing a comrade with a proven record of translating advanced theoretical insights into tangible technological advancements. Join me in replacing yesterday’s “flip-flop” with tomorrow’s flip-flap-flop. Let’s build the Computational Science that Donald Knuth merely foreshadowed!
1
Total supporters
$6
per month