The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper
|
|
- Angelina Melton
- 5 years ago
- Views:
Transcription
1 The Turing Definability of the Relation of Computably Enumerable In S. Barry Cooper Computability Theory Seminar University of Leeds Winter,
2 1. The big picture Turing definability/invariance Computability theory Church s thesis Mathematical information content Empirically observable phenomena Scientific theory Scientific questions e.g. in quantum theory Mathematical foundations Humanities v. Sciences - epistemological relativism
3 2. Basics Corresponding to the i th Turing machine, Φ i denotes the ith partial computable (p.c.) functional 2 ω 2 ω. A is Turing reducible to a B (A T B ) iff A = Φ B i, some i ω and A, B are Turing equivalent (A T B ) iff A T B and B T A. The degree of unsolvability or Turing degree of A is defined by deg (A) = {X 2 ω A T X}. is the induced partial ordering on D (= the set of all degrees), 0 = the least degree (consisting of all computable sets of numbers), and D is the structure D,. Wi A = dom Φ A i denotes the ith computably enumerable in A (A-c.e.) set (W i = Wi being the ith c.e. set). The jump or n + 1th jump of a set A is defined by A = A (1) = {x x W A x } or, A (n+1) = (A (n) ) ), respectively.
4 The jump operator on degrees is defined by a = deg (A ), A a, where a < a, and a is the l.u.b. of the degrees of sets c.e. in A a. And write a (n+1) = deg (A (n+1) ) = (a (n) ). Define the standard ω -jump of a by a (ω) = deg ( n ω A (n) ), A a. Write D for the structure D,,. A relation on D is Turing definable iff it is describable in the first order theory of D. Will assume standard computable sequences {Φ i,s } s 0, {W A i,s } s 0 of finite approximations to the p.c. functionals and c.e. sets, respectively. Denote by A[s], or A s, the corresponding approximation to an expression A at a stage s. The restriction ψ x of a function ψ is taken to be its restriction to arguments x. And if Φ is some functional and Φ A (x), the use ϕ A (x) of Φ A (x) will be taken to be µz[φ A z (x) ].
5 0 D 0 High n E Low n Turing definable 0... and Turing invariant Naturally arising information content in the Turing universe
6 3. Pseudo-jump operators Definition 3.1: Say J n is an n-cea operator iff there exist j 0, j 1,..., j n 1 ω such that J k (A) T W J k (A) j k, each k < n, A ω, and J n is inductively defined by J 0 (A) = A, J k+1 (A) = W J k (A) j k, (k < n). If D = W i W j, some i, j 0, say D is a d-c.e. set (a difference of two c.e. sets). Lemma 3.2: If D = W i W j then A (W A i W A j is a d-c.e. set ) is a 2-CEA operator. Proof (Lachlan; Jockusch and Shore [1984]). Make a special choice of the indices j 0, j 1 in definition 3.1 in relation to i, j
7 Choose j 0, j 1 so that for each set X of numbers W X j 0 = X [{ x, s x (W X i,s+1 W X i,s)} { x, s + 1 x (W X i,s+1 W X i,s) W X j }], W X Y j 1 = X {x s [ x, s Y & x, s ± 1 / Y ]}, and define the operator J 2 by J 2 (A) = W J 1 (A) j 1, where J 1 (A) = W A j 0. Need to verify: (a) that J 2 (A) = A (Wi A Wj A) and (b) that J 2 is a 2-CEA operator. For (a): Notice that (J 2 (A)) 0 = (W J 1 (A) j 1 ) 0 = (J 1 (A)) 0 = (Wj A 0 ) 0 = A and
8 x (J 2 (A)) 1 x (W J 1 (A) j 1 ) 1 s [ x, s (W A j 0 ) 1 & x, s ± 1 / (W A j 0 ) 1 ] x (W A i W A j ), giving J 2 (A) = A (W A i W A j ). And for (b): It follows straight from the definition that X T W X j 0, so J 1 is a 1-CEA operator. To show that J 1 (A) T W J 1 (A) j 1 need to check that Wj A 0 T J 2 (A) = A (Wi A Wj A). But x (W A j 0 ) 0 x A and x, s (W A j 0 ) 1 x (W A i,s+1 W A i,s) x (W A i,s W A i,s 1) W A j x (W A i,s+1 W A i,s) [x (W A i,s W A i,s 1) & x / W A i W A j ], so Wj A 0 T A (Wi A Wj A), and J 2 is a 2-CEA operator, as required.
9 4. Jump inversion String notation: σ, τ etc. denote finite binary strings (i.e. 0-1 valued functions with finite ordinal domains). σ = the length of σ. σˆτ denotes the concatenation of σ, τ (= σ followed by τ ). Write σ τ iff τ is an extension of σ, σ A iff σ is a beginning of (the characteristic function of) A. σ, τ are compatible (σ τ ) iff σ τ or τ σ otherwise write σ τ. Write = the empty string, and S = the set of all strings. T : S S is a tree iff τ σ S : (i) T(σ) T(τ) T(σ), and, for i 1, (ii) T(τˆi) T(τˆ(1 i)) T(τˆi).
10 Jump Inversion Theorem for 2- CEA Operators: If J 2 is a 2-CEA operator, then for each C T there is a set A such that C T J 2 (A). Note: Since pseudo-jumps are not necessarily degree theoretic, cannot just iterate the jump inversion theorem for 1-CEA operators. Proof. Let J 2 (X) = W W X j i = W i (Wj X ) define the 2-CEA operator J 2 from indices i, j. Need to construct a set A such that W i (W A j ) T A T C. Define an increasing sequence {σ n } n 0 of strings chosen off a tree T and take (the characteristic function of) A = n 0 σ n.
11 Aim: (i) Construct T so that, for each string τ with τ > n, T(τ) decides whether n Wj σ for any σ T(τ), and then (ii) Choose the σ s A on T to code C into A with help from and to decide whether n J 2 (A). Definition of T : Define T( ) =. Assume T(τ) with τ = n 0 (that is, with T(τ) at level n on T ). Ask if σ T(τ) with n W σ j, σ. Then define T(τˆ0), (τˆ1) = σˆ0, σˆ1, respectively, where σ is the first such σ (in some standard listing of strings) if such a σ exists and otherwise σ is the first σ T(τ). Notice that T T.
12 The construction of {σ n } n 0 Stage 0. Define σ 0 = T( ). Stage 2n+1. If there exists a string σ σ 2n at some level x + 1, say, on T with n W i (W σ j x)[ σ ], let σ 2n+1 be the first such σ. Otherwise let σ 2n+1 = σ 2n. Stage 2n + 2. Define σ 2n+2 = the first T(τˆC(n)) σ 2n+1. Now observe the following sequence of facts (1) {σ n } n 0 T C. This holds because stages 2n + 1, n 0, can be carried out computably in T T T C, and stages 2n, n 0, can be carried out computably in T, C T C. Hence: (2) A T C ; and
13 (3) W i (W A j ) T C Since, for each n 0, Also: n W i (W A j ) σ 2n+1 σ 2n. (4) C T {σ n } n 0 Since, if one writes σ n = T(τ n ), each n ω, one has C(n) = τ 2n+2 ( τ 2n+2 1) each n 0, = σ 2n+2 ( σ 2n+2 1), (5) {σ n } n 0 T A Since stage 2n + 1 can be carried out computably in, and stage 2n + 2 can be carried out computably in T T and A, and (6) {σ n } n 0 T W i (W A j ). To verify this, one first notices that since J 2 is a 2-CEA operator one has A T Wj A and Wj A T W i (Wj A ). Then
14 To carry out stage 2n + 1 one can compute { σ, x σ 2n σ A & W A j x = W σ j, σ x} with the use of A and Wj A {T(τ) A τ τ 2n }., and hence also Can then compute σ 2n+1 with help from W i (W A j ). Similarly, one can carry out stage 2n of the construction using A and W A j. So from (5) and (6) one gets: (7) C T W i (W A j ) and A. Combining (2), (3) and (7) the theorem follows. Note: Only need the analogue of Friedberg s theorem for a 2-CEA operator derived as in Lemma 3.2 from a d-c.e. set. This is a main ingredient of
15 5. A jump and join theorem The basic jump-join theorem for 2-CEA operators derived from a d-c.e. set: If J 2 is a 2-CEA operator derived from a d-c.e. set, then if C T X and X T, one can find an A such that X A T C T J 2 (A). Proof. An extension of the Posner-Robinson [1981] cupping theorem. Choose i, j s.t. J 2 (X) = W W X j i = W i (W X j ). From the proof of Lemma 3.2, can assume that W i, W j are given by equations of the form W X j =X [{ x, s x (W X i,s+1 W X i,s)} { x, s + 1 x (W X i,s+1 W X i,s) W X j }], W X Y i =X {x s [ x, s Y & x, s ± 1 / Y ]}, where J 2 (A) = A (W A i W A j ).
16 Without changing the degree of X, can assume that X is -immune (i.e., has no infinite -c.e. subsets). Wish to construct a set A satisfying the picture: A X T C T J 2 (A) T W i (W A j ) X J 2 X A As before, define A = n 0 σ n, where the σ s A are chosen to Code C into A with help from X,
17 To force certain x, s W σ j, σ σ n, And to ensure that, for each n ω, n J 2 (A) n W i (W σ j M)[ σ ], σ corresponding to n, and M depending on the construction. Note: One cannot choose {σ n } n 0 off a tree T as in the jump inversion theorem above since then one would not be able to obtain T both from A X and from J 2 (A). Instead, one chooses σ n off a tree T n,π specifically adapted for stage n + 1 of the construction and used in such a way that the construction is retrievable from A X and from J 2 (A). T n,π is constructed so that, for each T n,π (τ) at level s on T n,π, T n,π (τ) decides whether n, s Wj σ for any σ T n,π (τ).
18 Definition of T n,π : Let T n,π ( ) = σ 2nˆπ. Assume T n,π (τ) with τ = s 0 i.e., with T n,π (τ) at level s on T n,π. Ask if there exists a σ T n,π (τ) with n, s + 1 W σ j, σ. Then define T n,π (τˆ0), (τˆ1) = σˆ0, σˆ1, respectively, where σ is the first such σ if such a σ exists and otherwise σ is the first σ T n,π (τ). Notice that T n,π T. The construction of {σ n } n 0 : Stage n = 0. Define σ 0 =.
19 Stage 2n + 1. Let 0 m denote a string of m zeros. Define T n,π [τ] = the full subtree of T n,π above T n,π (τ). Say T n,π [τ] forces n J 2 (A) at level s + 1 iff n, s W T n,π(τ) j and n, s ± 1 / W T n,π(τ) j. T n,π [τ] forces n / J 2 (A) iff for no s ω, and no τ τ, does T n,π [τ ] force n J 2 (A) at level s + 1. At stage 2n + 1, choose the least m = n, s, some s ω, such that either (a) m / X and there is some T n,0mˆ1[τ] which forces n J 2 (A) at some level s + 1, or (b) m X and T n,0mˆ1[ ] forces n / J 2 (A). Define σ 2n+1 = T n,0mˆ1[τ 2n+1 ] where τ 2n+1 = the least string τ for which (a) holds, if appropriate and otherwise =.
20 Note: In case (a), σ 2n+1 T n,0mˆ1(τ 2n+1 ) will give n J 2 (A) by virtue of n, s W σ 2n+1 j and n, s ± 1 / W σ 2n+1 j giving n, s ± 1 / Wj σ, any σ σ 2n+1. But From case (b) may get n, s W σ p+1 some p 2n but n, s ± 1 / W σ p+1 j so n J 2 (A) again. j,, any p And Cannot in case (b) treat the cases: (i) n, s W σ j, some σ σ 2n, (ii) n, s / W σ j, any σ σ 2n, differently to get n J 2 (A) n J 2 (σ 2n+1 ), since could not then retrieve σ 2n+1 from J 2 (A). Consequently Following case (b), the forcing of n / J 2 (A) is current at all stages 2p + 2 > 2n + 1 for which there is no existing n, s W σ 2p j,p, with s p.
21 Stage 2n + 2. Check if there is a current forcing of any p / J 2 (A), for which p, s W σ 2n+1 j,n, some s n and which now ceases to be active Choose the least π σ 2n+1 for which some p, s ± 1 Wj, π π, each such p And define σ 2n+2 = πˆc(n). Notice It now follows that in case (b) of stage 2n + 1 in which such a τ does not exist one has n / J 2 (A) by virtue of n / J 2 (σ), all σ σ 2p+2, some p n. One needs to check that the construction can be carried out which means verifying that m exists in the definition of σ 2n+1.
22 To see this first notice that S is Σ 2 and so c.e. in where S is defined by S = {m ( τ)( s)[t n,0mˆ1[τ] forces n J 2 (A) at level s + 1]}. If S is finite then there is some m X S so m X and ( τ)( s)[t n,0mˆ1[τ] does not force n J 2 (A) at level s + 1] Giving m X and T n,0mˆ1[ ] forces n / J 2 (A) which is (b). And if S is infinite there is some m S X, since X is -immune. So for this m one has m / X and ( τ)( s)[t n,0mˆ1[τ] forces n J 2 (A) at level s + 1] giving (a).
23 Now verify the following sequence of facts (1) {σ p } p 0 T C. This is because stage 2n + 1 can be carried out computably in X T C And stage 2n + 2 is executed computably, apart from the coding of C(n) into σ 2n+2. Hence: (2) A X T C ; and (3) W i (W A j ) T C Since for each n 0, m in stage 2n + 1 is retrievable from σ 2n and A and n W i (W A j ) σ 2n+1 > σ 2nˆ0 mˆ1. To see this, first notice that
24 σ 2n+1 > σ 2nˆ0 mˆ1 m / X & ( τ, s)[t n,0mˆ1[τ] forces n J 2 (A) at level s + 1] m / X & ( s)[ n, s W j (T n,0mˆ1(τ 2n+1 )) & ( τ τ 2n+1 )( n, s ± 1 / W j (T n,0mˆ1(τ )))] m / X & ( Y T n,0mˆ1(τ 2n+1 ))(n W i (W Y j )) n W i (W A j ). Conversely, if n W i (Wj A ) there exists a y such that n, y Wj A and n, y ± 1 / Wj A. This means that case (b) cannot apply at stage 2n + 1 since then the forcing of n / J 2 (A) would cease to be active at some stage 2p + 2 > 2n + 1 giving n, y ± 1 W A j But this means that at stage 2n + 1 one chooses τ 2n+1 so that T n,0mˆ1[τ 2n+1 ] forces n J 2 (A) at level y + 1 so σ 2n+1 > σ 2nˆ0 mˆ1, as required. Also
25 (4) C T {σ p } p 0 Since one has C(n) = σ 2n+2 ( σ 2n+2 1), each n 0. (5) {σ p } p 0 T A X. To reproduce stage 2n + 1 of the construction, one can use σ 2n and A to find m And then check whether m X or not to see which of cases (a) or (b) apply at stage 2n + 1. If m X, so (b) applies, one has τ 2n+1 =. So T n,0mˆ1(τ 2n+1 ) = σ 2nˆ0 mˆ1. If m / X so (a) applies one can find T n,0mˆ1(τ 2n+1 ) σ 2nˆ0 mˆ1 with help from A. And then σ 2n+1 = T n,0mˆ1(τ 2n+1 ). And to reproduce stage 2n + 2 of the construction, one can computably obtain π And get σ 2n+1 = πˆa( π ).
26 (6) {σ p } p 0 T W i (W A j ). To verify this, first notice that since J 2 is a 2-CEA operator one has A T W A j and W A j T W i (W A j ). To carry out stage 2n + 1 one can find m from σ 2n and A verify whether n W i (W A j ) so as to see if one is in case (a) or (b) and find T n,0mˆ1(τ 2n+1 ), and hence σ 2n+1, with help from A and W A j. While one can carry out stage 2n + 2 computably as far as obtaining π and then σ 2n+2 = πˆa( π ). So from (5) and (6) one gets: (7) C T W i (W A j ) and A X. Combining (2), (3) and (7) the theorem follows. Note: The basic jump-join theorem is sufficient for a natural Turing definition of the jump. But a local version is needed to provide that of the relation of computably enumerable in, which applies to 2-CEA operators derived from special d.c.e. sets
An effective perfect-set theorem
An effective perfect-set theorem David Belanger, joint with Keng Meng (Selwyn) Ng CTFM 2016 at Waseda University, Tokyo Institute for Mathematical Sciences National University of Singapore The perfect
More informationA DNC function that computes no effectively bi-immune set
A DNC function that computes no effectively bi-immune set Achilles A. Beros Laboratoire d Informatique de Nantes Atlantique, Université de Nantes July 5, 204 Standard Definitions Definition f is diagonally
More informationStructural Induction
Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason
More informationA relation on 132-avoiding permutation patterns
Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,
More informationCupping and noncupping in the enumeration degrees of Σ 0 2 sets
Cupping and noncupping in the enumeration degrees of Σ 0 2 sets S. Barry Cooper School of Mathematics, University of Leeds LS2 9JT, England Andrea Sorbi Department of Mathematics, University of Siena 53100
More informationDevelopment Separation in Lambda-Calculus
Development Separation in Lambda-Calculus Hongwei Xi Boston University Work partly funded by NSF grant CCR-0229480 Development Separation in Lambda-Calculus p.1/26 Motivation for the Research To facilitate
More informationLecture 2: The Simple Story of 2-SAT
0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that
More informationSy D. Friedman. August 28, 2001
0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such
More informationBrief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus
University of Cambridge 2017 MPhil ACS / CST Part III Category Theory and Logic (L108) Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus Andrew Pitts Notation: comma-separated
More informationarxiv: v1 [math.co] 31 Mar 2009
A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of
More information3 The Model Existence Theorem
3 The Model Existence Theorem Although we don t have compactness or a useful Completeness Theorem, Henkinstyle arguments can still be used in some contexts to build models. In this section we describe
More informationLattices and the Knaster-Tarski Theorem
Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3
More informationLecture l(x) 1. (1) x X
Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we
More informationCATEGORICAL SKEW LATTICES
CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most
More informationGeneralising the weak compactness of ω
Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak
More informationThe Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.
The Real Numbers Here we show one way to explicitly construct the real numbers R. First we need a definition. Definitions/Notation: A sequence of rational numbers is a funtion f : N Q. Rather than write
More informationStrongly compact Magidor forcing.
Strongly compact Magidor forcing. Moti Gitik June 25, 2014 Abstract We present a strongly compact version of the Supercompact Magidor forcing ([3]). A variation of it is used to show that the following
More informationarxiv: v2 [math.lo] 13 Feb 2014
A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the
More informationCOMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS
COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence
More informationOn the Lower Arbitrage Bound of American Contingent Claims
On the Lower Arbitrage Bound of American Contingent Claims Beatrice Acciaio Gregor Svindland December 2011 Abstract We prove that in a discrete-time market model the lower arbitrage bound of an American
More informationOrthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF
Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster
More informationOn the Number of Permutations Avoiding a Given Pattern
On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2
More informationTABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC
TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known
More informationLECTURE 2: MULTIPERIOD MODELS AND TREES
LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world
More informationGame Theory: Normal Form Games
Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.
More informationbeing saturated Lemma 0.2 Suppose V = L[E]. Every Woodin cardinal is Woodin with.
On NS ω1 being saturated Ralf Schindler 1 Institut für Mathematische Logik und Grundlagenforschung, Universität Münster Einsteinstr. 62, 48149 Münster, Germany Definition 0.1 Let δ be a cardinal. We say
More informationMITCHELL S THEOREM REVISITED. Contents
MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no
More informationTR : Knowledge-Based Rational Decisions and Nash Paths
City University of New York (CUNY) CUNY Academic Works Computer Science Technical Reports Graduate Center 2009 TR-2009015: Knowledge-Based Rational Decisions and Nash Paths Sergei Artemov Follow this and
More informationSemantics and Verification of Software
Semantics and Verification of Software Thomas Noll Software Modeling and Verification Group RWTH Aachen University http://moves.rwth-aachen.de/teaching/ws-1718/sv-sw/ Recap: CCPOs and Continuous Functions
More information6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2
6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Review Examples of Pure Strategy Nash Equilibria Mixed Strategies
More informationFORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper.
FORCING AND THE HALPERN-LÄUCHLI THEOREM NATASHA DOBRINEN AND DAN HATHAWAY Abstract. We will show the various effects that forcing has on the Halpern-Läuchli Theorem. We will show that the the theorem at
More informationLogic and Artificial Intelligence Lecture 24
Logic and Artificial Intelligence Lecture 24 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit
More informationTHE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET
THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the
More informationEXTENSIVE AND NORMAL FORM GAMES
EXTENSIVE AND NORMAL FORM GAMES Jörgen Weibull February 9, 2010 1 Extensive-form games Kuhn (1950,1953), Selten (1975), Kreps and Wilson (1982), Weibull (2004) Definition 1.1 A finite extensive-form game
More informationUnary PCF is Decidable
Unary PCF is Decidable Ralph Loader Merton College, Oxford November 1995, revised October 1996 and September 1997. Abstract We show that unary PCF, a very small fragment of Plotkin s PCF [?], has a decidable
More informationQuadrant marked mesh patterns in 123-avoiding permutations
Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department
More informationPermutation Factorizations and Prime Parking Functions
Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,
More informationMathematics Notes for Class 12 chapter 1. Relations and Functions
1 P a g e Mathematics Notes for Class 12 chapter 1. Relations and Functions Relation If A and B are two non-empty sets, then a relation R from A to B is a subset of A x B. If R A x B and (a, b) R, then
More information4 Martingales in Discrete-Time
4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1
More informationNOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES
0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations
More information2 Deduction in Sentential Logic
2 Deduction in Sentential Logic Though we have not yet introduced any formal notion of deductions (i.e., of derivations or proofs), we can easily give a formal method for showing that formulas are tautologies:
More informationNotes on Natural Logic
Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation
More informationLARGE CARDINALS AND L-LIKE UNIVERSES
LARGE CARDINALS AND L-LIKE UNIVERSES SY D. FRIEDMAN There are many different ways to extend the axioms of ZFC. One way is to adjoin the axiom V = L, asserting that every set is constructible. This axiom
More informationUndecidability and 1-types in Intervals of the Computably Enumerable Degrees
Undecidability and 1-types in Intervals of the Computably Enumerable Degrees Klaus Ambos-Spies Mathematisches Institut, Universität Heidelberg, D-69120 Heidelberg, Germany Denis R. Hirschfeldt Department
More informationIntroduction to Probability Theory and Stochastic Processes for Finance Lecture Notes
Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,
More informationBest response cycles in perfect information games
P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski
More informationUNIVERSITY OF OSLO. Faculty of Mathematics and Natural Sciences
UNIVERSITY OF OSLO Faculty of Mathematics and Natural Sciences Examination in MAT2700 Introduction to mathematical finance and investment theory. Day of examination: Monday, December 14, 2015. Examination
More informationCompositional Models in Valuation-Based Systems
Appeared in: Belief Functions: Theory and Applications, T. Denoeux and M.-H. Masson (eds.), Advances in Intelligent and Soft Computing 164, 2012, pp. 221--228, Springer-Verlag, Berlin. Compositional Models
More informationInversion Formulae on Permutations Avoiding 321
Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. chenpingge@hnu.edu.cn Suijie Wang College of Mathematics and Econometrics
More informationExtender based forcings, fresh sets and Aronszajn trees
Extender based forcings, fresh sets and Aronszajn trees Moti Gitik August 31, 2011 Abstract Extender based forcings are studied with respect of adding branches to Aronszajn trees. We construct a model
More informationDecidability and Recursive Languages
Decidability and Recursive Languages Let L (Σ { }) be a language, i.e., a set of strings of symbols with a finite length. For example, {0, 01, 10, 210, 1010,...}. Let M be a TM such that for any string
More informationCS792 Notes Henkin Models, Soundness and Completeness
CS792 Notes Henkin Models, Soundness and Completeness Arranged by Alexandra Stefan March 24, 2005 These notes are a summary of chapters 4.5.1-4.5.5 from [1]. 1 Review indexed family of sets: A s, where
More informationSilver type theorems for collapses.
Silver type theorems for collapses. Moti Gitik May 19, 2014 The classical theorem of Silver states that GCH cannot break for the first time over a singular cardinal of uncountable cofinality. On the other
More informationDevelopment Separation in Lambda-Calculus
WoLLIC 2005 Preliminary Version Development Separation in Lambda-Calculus Hongwei Xi 1,2 Computer Science Department Boston University Boston, Massachusetts, USA Abstract We present a proof technique in
More informationADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction
ADDING A LOT OF COHEN REALS BY ADDING A FEW II MOTI GITIK AND MOHAMMAD GOLSHANI Abstract. We study pairs (V, V 1 ), V V 1, of models of ZF C such that adding κ many Cohen reals over V 1 adds λ many Cohen
More informationThe Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)
The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,
More informationHEIKE MILDENBERGER AND SAHARON SHELAH
A VERSION OF κ-miller FORCING HEIKE MILDENBERGER AND SAHARON SHELAH Abstract. Let κ be an uncountable cardinal such that 2 ω, 2 2
More informationAlgorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information
Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information
More informationA class of coherent risk measures based on one-sided moments
A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall
More informationA Translation of Intersection and Union Types
A Translation of Intersection and Union Types for the λ µ-calculus Kentaro Kikuchi RIEC, Tohoku University kentaro@nue.riec.tohoku.ac.jp Takafumi Sakurai Department of Mathematics and Informatics, Chiba
More informationOn Existence of Equilibria. Bayesian Allocation-Mechanisms
On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine
More informationIntroduction to Greedy Algorithms: Huffman Codes
Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that
More informationPhilipp Moritz Lücke
Σ 1 -partition properties Philipp Moritz Lücke Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn http://www.math.uni-bonn.de/people/pluecke/ Logic & Set Theory Seminar Bristol, 14.02.2017
More informationThe Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d)
The Traveling Salesman Problem We are given n cities 1, 2,..., n and integer distances d ij between any two cities i and j. Assume d ij = d ji for convenience. The traveling salesman problem (tsp) asks
More informationStrong normalisation and the typed lambda calculus
CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these
More informationOutline of Lecture 1. Martin-Löf tests and martingales
Outline of Lecture 1 Martin-Löf tests and martingales The Cantor space. Lebesgue measure on Cantor space. Martin-Löf tests. Basic properties of random sequences. Betting games and martingales. Equivalence
More informationApproximate Revenue Maximization with Multiple Items
Approximate Revenue Maximization with Multiple Items Nir Shabbat - 05305311 December 5, 2012 Introduction The paper I read is called Approximate Revenue Maximization with Multiple Items by Sergiu Hart
More informationLossy compression of permutations
Lossy compression of permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Wang, Da, Arya Mazumdar,
More informationLecture 14: Basic Fixpoint Theorems (cont.)
Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E
More informationMaximally Consistent Extensions
Chapter 4 Maximally Consistent Extensions Throughout this chapter we require that all formulae are written in Polish notation and that the variables are amongv 0,v 1,v 2,... Recall that by the PRENEX NORMAL
More informationGödel algebras free over finite distributive lattices
TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria
More informationInterpolation of κ-compactness and PCF
Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has
More informationExistentially closed models of the theory of differential fields with a cyclic automorphism
Existentially closed models of the theory of differential fields with a cyclic automorphism University of Tsukuba September 15, 2014 Motivation Let C be any field and choose an arbitrary element q C \
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.
More informationÉcole normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P.
École normale supérieure, MPRI, M2 Year 2007/2008 Course 2-6 Abstract interpretation: application to verification and static analysis P. Cousot Questions and answers of the partial exam of Friday November
More informationNew tools of set-theoretic homological algebra and their applications to modules
New tools of set-theoretic homological algebra and their applications to modules Jan Trlifaj Univerzita Karlova, Praha Workshop on infinite-dimensional representations of finite dimensional algebras Manchester,
More informationCS 4110 Programming Languages & Logics. Lecture 2 Introduction to Semantics
CS 4110 Programming Languages & Logics Lecture 2 Introduction to Semantics 29 August 2012 Announcements 2 Wednesday Lecture Moved to Thurston 203 Foster Office Hours Today 11a-12pm in Gates 432 Mota Office
More informationIntroduction to Game Theory:
Introduction to Game Theory: Cooperative Game Theory Version 10/29/17 The Two Branches of Game Theory In non-cooperative game theory, a game model is a detailed description of all the moves available to
More informationCOMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants
COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants Due Wednesday March 12, 2014. CS 20 students should bring a hard copy to class. CSCI
More informationMartingales. by D. Cox December 2, 2009
Martingales by D. Cox December 2, 2009 1 Stochastic Processes. Definition 1.1 Let T be an arbitrary index set. A stochastic process indexed by T is a family of random variables (X t : t T) defined on a
More informationFinding Equilibria in Games of No Chance
Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk
More informationSemantics with Applications 2b. Structural Operational Semantics
Semantics with Applications 2b. Structural Operational Semantics Hanne Riis Nielson, Flemming Nielson (thanks to Henrik Pilegaard) [SwA] Hanne Riis Nielson, Flemming Nielson Semantics with Applications:
More informationThe (λ, κ)-fn and the order theory of bases in boolean algebras
The (λ, κ)-fn and the order theory of bases in boolean algebras David Milovich Texas A&M International University david.milovich@tamiu.edu http://www.tamiu.edu/ dmilovich/ June 2, 2010 BLAST 1 / 22 The
More informationUPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES
UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES JOHN BALDWIN, DAVID KUEKER, AND MONICA VANDIEREN Abstract. Grossberg and VanDieren have started a program to develop a stability theory for
More informationHierarchical Exchange Rules and the Core in. Indivisible Objects Allocation
Hierarchical Exchange Rules and the Core in Indivisible Objects Allocation Qianfeng Tang and Yongchao Zhang January 8, 2016 Abstract We study the allocation of indivisible objects under the general endowment
More informationLevel by Level Inequivalence, Strong Compactness, and GCH
Level by Level Inequivalence, Strong Compactness, and GCH Arthur W. Apter Department of Mathematics Baruch College of CUNY New York, New York 10010 USA and The CUNY Graduate Center, Mathematics 365 Fifth
More informationMath-Stat-491-Fall2014-Notes-V
Math-Stat-491-Fall2014-Notes-V Hariharan Narayanan December 7, 2014 Martingales 1 Introduction Martingales were originally introduced into probability theory as a model for fair betting games. Essentially
More informationThe Value of Information in Central-Place Foraging. Research Report
The Value of Information in Central-Place Foraging. Research Report E. J. Collins A. I. Houston J. M. McNamara 22 February 2006 Abstract We consider a central place forager with two qualitatively different
More informationBuilding Infinite Processes from Regular Conditional Probability Distributions
Chapter 3 Building Infinite Processes from Regular Conditional Probability Distributions Section 3.1 introduces the notion of a probability kernel, which is a useful way of systematizing and extending
More informationLECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS
LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to
More informationSmoothed Analysis of Binary Search Trees
Smoothed Analysis of Binary Search Trees Bodo Manthey and Rüdiger Reischuk Universität zu Lübeck, Institut für Theoretische Informatik Ratzeburger Allee 160, 23538 Lübeck, Germany manthey/reischuk@tcs.uni-luebeck.de
More informationSTRONGLY UNFOLDABLE CARDINALS MADE INDESTRUCTIBLE
The Journal of Symbolic Logic Volume 73, Number 4, Dec. 2008 STRONGLY UNFOLDABLE CARDINALS MADE INDESTRUCTIBLE THOMAS A. JOHNSTONE Abstract. I provide indestructibility results for large cardinals consistent
More informationCost Sharing in a Job Scheduling Problem
Cost Sharing in a Job Scheduling Problem Debasis Mishra Bharath Rangarajan April 19, 2005 Abstract A set of jobs need to be served by a server which can serve only one job at a time. Jobs have processing
More informationA Property Equivalent to n-permutability for Infinite Groups
Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar
More informationOutline. 1 Introduction. 2 Algorithms. 3 Examples. Algorithm 1 General coordinate minimization framework. 1: Choose x 0 R n and set k 0.
Outline Coordinate Minimization Daniel P. Robinson Department of Applied Mathematics and Statistics Johns Hopkins University November 27, 208 Introduction 2 Algorithms Cyclic order with exact minimization
More informationArborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems
Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Ahmed Khoumsi and Hicham Chakib Dept. Electrical & Computer Engineering, University of Sherbrooke, Canada Email:
More informationLecture 12. Some Useful Continuous Distributions. The most important continuous probability distribution in entire field of statistics.
ENM 207 Lecture 12 Some Useful Continuous Distributions Normal Distribution The most important continuous probability distribution in entire field of statistics. Its graph, called the normal curve, is
More informationMixed Strategies. Samuel Alizon and Daniel Cownden February 4, 2009
Mixed Strategies Samuel Alizon and Daniel Cownden February 4, 009 1 What are Mixed Strategies In the previous sections we have looked at games where players face uncertainty, and concluded that they choose
More informationNo-arbitrage theorem for multi-factor uncertain stock model with floating interest rate
Fuzzy Optim Decis Making 217 16:221 234 DOI 117/s17-16-9246-8 No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Xiaoyu Ji 1 Hua Ke 2 Published online: 17 May 216 Springer
More informationINTERIM CORRELATED RATIONALIZABILITY IN INFINITE GAMES
INTERIM CORRELATED RATIONALIZABILITY IN INFINITE GAMES JONATHAN WEINSTEIN AND MUHAMET YILDIZ A. We show that, under the usual continuity and compactness assumptions, interim correlated rationalizability
More information