The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper

Size: px
Start display at page:

Download "The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper"

Transcription

1 The Turing Definability of the Relation of Computably Enumerable In S. Barry Cooper Computability Theory Seminar University of Leeds Winter,

2 1. The big picture Turing definability/invariance Computability theory Church s thesis Mathematical information content Empirically observable phenomena Scientific theory Scientific questions e.g. in quantum theory Mathematical foundations Humanities v. Sciences - epistemological relativism

3 2. Basics Corresponding to the i th Turing machine, Φ i denotes the ith partial computable (p.c.) functional 2 ω 2 ω. A is Turing reducible to a B (A T B ) iff A = Φ B i, some i ω and A, B are Turing equivalent (A T B ) iff A T B and B T A. The degree of unsolvability or Turing degree of A is defined by deg (A) = {X 2 ω A T X}. is the induced partial ordering on D (= the set of all degrees), 0 = the least degree (consisting of all computable sets of numbers), and D is the structure D,. Wi A = dom Φ A i denotes the ith computably enumerable in A (A-c.e.) set (W i = Wi being the ith c.e. set). The jump or n + 1th jump of a set A is defined by A = A (1) = {x x W A x } or, A (n+1) = (A (n) ) ), respectively.

4 The jump operator on degrees is defined by a = deg (A ), A a, where a < a, and a is the l.u.b. of the degrees of sets c.e. in A a. And write a (n+1) = deg (A (n+1) ) = (a (n) ). Define the standard ω -jump of a by a (ω) = deg ( n ω A (n) ), A a. Write D for the structure D,,. A relation on D is Turing definable iff it is describable in the first order theory of D. Will assume standard computable sequences {Φ i,s } s 0, {W A i,s } s 0 of finite approximations to the p.c. functionals and c.e. sets, respectively. Denote by A[s], or A s, the corresponding approximation to an expression A at a stage s. The restriction ψ x of a function ψ is taken to be its restriction to arguments x. And if Φ is some functional and Φ A (x), the use ϕ A (x) of Φ A (x) will be taken to be µz[φ A z (x) ].

5 0 D 0 High n E Low n Turing definable 0... and Turing invariant Naturally arising information content in the Turing universe

6 3. Pseudo-jump operators Definition 3.1: Say J n is an n-cea operator iff there exist j 0, j 1,..., j n 1 ω such that J k (A) T W J k (A) j k, each k < n, A ω, and J n is inductively defined by J 0 (A) = A, J k+1 (A) = W J k (A) j k, (k < n). If D = W i W j, some i, j 0, say D is a d-c.e. set (a difference of two c.e. sets). Lemma 3.2: If D = W i W j then A (W A i W A j is a d-c.e. set ) is a 2-CEA operator. Proof (Lachlan; Jockusch and Shore [1984]). Make a special choice of the indices j 0, j 1 in definition 3.1 in relation to i, j

7 Choose j 0, j 1 so that for each set X of numbers W X j 0 = X [{ x, s x (W X i,s+1 W X i,s)} { x, s + 1 x (W X i,s+1 W X i,s) W X j }], W X Y j 1 = X {x s [ x, s Y & x, s ± 1 / Y ]}, and define the operator J 2 by J 2 (A) = W J 1 (A) j 1, where J 1 (A) = W A j 0. Need to verify: (a) that J 2 (A) = A (Wi A Wj A) and (b) that J 2 is a 2-CEA operator. For (a): Notice that (J 2 (A)) 0 = (W J 1 (A) j 1 ) 0 = (J 1 (A)) 0 = (Wj A 0 ) 0 = A and

8 x (J 2 (A)) 1 x (W J 1 (A) j 1 ) 1 s [ x, s (W A j 0 ) 1 & x, s ± 1 / (W A j 0 ) 1 ] x (W A i W A j ), giving J 2 (A) = A (W A i W A j ). And for (b): It follows straight from the definition that X T W X j 0, so J 1 is a 1-CEA operator. To show that J 1 (A) T W J 1 (A) j 1 need to check that Wj A 0 T J 2 (A) = A (Wi A Wj A). But x (W A j 0 ) 0 x A and x, s (W A j 0 ) 1 x (W A i,s+1 W A i,s) x (W A i,s W A i,s 1) W A j x (W A i,s+1 W A i,s) [x (W A i,s W A i,s 1) & x / W A i W A j ], so Wj A 0 T A (Wi A Wj A), and J 2 is a 2-CEA operator, as required.

9 4. Jump inversion String notation: σ, τ etc. denote finite binary strings (i.e. 0-1 valued functions with finite ordinal domains). σ = the length of σ. σˆτ denotes the concatenation of σ, τ (= σ followed by τ ). Write σ τ iff τ is an extension of σ, σ A iff σ is a beginning of (the characteristic function of) A. σ, τ are compatible (σ τ ) iff σ τ or τ σ otherwise write σ τ. Write = the empty string, and S = the set of all strings. T : S S is a tree iff τ σ S : (i) T(σ) T(τ) T(σ), and, for i 1, (ii) T(τˆi) T(τˆ(1 i)) T(τˆi).

10 Jump Inversion Theorem for 2- CEA Operators: If J 2 is a 2-CEA operator, then for each C T there is a set A such that C T J 2 (A). Note: Since pseudo-jumps are not necessarily degree theoretic, cannot just iterate the jump inversion theorem for 1-CEA operators. Proof. Let J 2 (X) = W W X j i = W i (Wj X ) define the 2-CEA operator J 2 from indices i, j. Need to construct a set A such that W i (W A j ) T A T C. Define an increasing sequence {σ n } n 0 of strings chosen off a tree T and take (the characteristic function of) A = n 0 σ n.

11 Aim: (i) Construct T so that, for each string τ with τ > n, T(τ) decides whether n Wj σ for any σ T(τ), and then (ii) Choose the σ s A on T to code C into A with help from and to decide whether n J 2 (A). Definition of T : Define T( ) =. Assume T(τ) with τ = n 0 (that is, with T(τ) at level n on T ). Ask if σ T(τ) with n W σ j, σ. Then define T(τˆ0), (τˆ1) = σˆ0, σˆ1, respectively, where σ is the first such σ (in some standard listing of strings) if such a σ exists and otherwise σ is the first σ T(τ). Notice that T T.

12 The construction of {σ n } n 0 Stage 0. Define σ 0 = T( ). Stage 2n+1. If there exists a string σ σ 2n at some level x + 1, say, on T with n W i (W σ j x)[ σ ], let σ 2n+1 be the first such σ. Otherwise let σ 2n+1 = σ 2n. Stage 2n + 2. Define σ 2n+2 = the first T(τˆC(n)) σ 2n+1. Now observe the following sequence of facts (1) {σ n } n 0 T C. This holds because stages 2n + 1, n 0, can be carried out computably in T T T C, and stages 2n, n 0, can be carried out computably in T, C T C. Hence: (2) A T C ; and

13 (3) W i (W A j ) T C Since, for each n 0, Also: n W i (W A j ) σ 2n+1 σ 2n. (4) C T {σ n } n 0 Since, if one writes σ n = T(τ n ), each n ω, one has C(n) = τ 2n+2 ( τ 2n+2 1) each n 0, = σ 2n+2 ( σ 2n+2 1), (5) {σ n } n 0 T A Since stage 2n + 1 can be carried out computably in, and stage 2n + 2 can be carried out computably in T T and A, and (6) {σ n } n 0 T W i (W A j ). To verify this, one first notices that since J 2 is a 2-CEA operator one has A T Wj A and Wj A T W i (Wj A ). Then

14 To carry out stage 2n + 1 one can compute { σ, x σ 2n σ A & W A j x = W σ j, σ x} with the use of A and Wj A {T(τ) A τ τ 2n }., and hence also Can then compute σ 2n+1 with help from W i (W A j ). Similarly, one can carry out stage 2n of the construction using A and W A j. So from (5) and (6) one gets: (7) C T W i (W A j ) and A. Combining (2), (3) and (7) the theorem follows. Note: Only need the analogue of Friedberg s theorem for a 2-CEA operator derived as in Lemma 3.2 from a d-c.e. set. This is a main ingredient of

15 5. A jump and join theorem The basic jump-join theorem for 2-CEA operators derived from a d-c.e. set: If J 2 is a 2-CEA operator derived from a d-c.e. set, then if C T X and X T, one can find an A such that X A T C T J 2 (A). Proof. An extension of the Posner-Robinson [1981] cupping theorem. Choose i, j s.t. J 2 (X) = W W X j i = W i (W X j ). From the proof of Lemma 3.2, can assume that W i, W j are given by equations of the form W X j =X [{ x, s x (W X i,s+1 W X i,s)} { x, s + 1 x (W X i,s+1 W X i,s) W X j }], W X Y i =X {x s [ x, s Y & x, s ± 1 / Y ]}, where J 2 (A) = A (W A i W A j ).

16 Without changing the degree of X, can assume that X is -immune (i.e., has no infinite -c.e. subsets). Wish to construct a set A satisfying the picture: A X T C T J 2 (A) T W i (W A j ) X J 2 X A As before, define A = n 0 σ n, where the σ s A are chosen to Code C into A with help from X,

17 To force certain x, s W σ j, σ σ n, And to ensure that, for each n ω, n J 2 (A) n W i (W σ j M)[ σ ], σ corresponding to n, and M depending on the construction. Note: One cannot choose {σ n } n 0 off a tree T as in the jump inversion theorem above since then one would not be able to obtain T both from A X and from J 2 (A). Instead, one chooses σ n off a tree T n,π specifically adapted for stage n + 1 of the construction and used in such a way that the construction is retrievable from A X and from J 2 (A). T n,π is constructed so that, for each T n,π (τ) at level s on T n,π, T n,π (τ) decides whether n, s Wj σ for any σ T n,π (τ).

18 Definition of T n,π : Let T n,π ( ) = σ 2nˆπ. Assume T n,π (τ) with τ = s 0 i.e., with T n,π (τ) at level s on T n,π. Ask if there exists a σ T n,π (τ) with n, s + 1 W σ j, σ. Then define T n,π (τˆ0), (τˆ1) = σˆ0, σˆ1, respectively, where σ is the first such σ if such a σ exists and otherwise σ is the first σ T n,π (τ). Notice that T n,π T. The construction of {σ n } n 0 : Stage n = 0. Define σ 0 =.

19 Stage 2n + 1. Let 0 m denote a string of m zeros. Define T n,π [τ] = the full subtree of T n,π above T n,π (τ). Say T n,π [τ] forces n J 2 (A) at level s + 1 iff n, s W T n,π(τ) j and n, s ± 1 / W T n,π(τ) j. T n,π [τ] forces n / J 2 (A) iff for no s ω, and no τ τ, does T n,π [τ ] force n J 2 (A) at level s + 1. At stage 2n + 1, choose the least m = n, s, some s ω, such that either (a) m / X and there is some T n,0mˆ1[τ] which forces n J 2 (A) at some level s + 1, or (b) m X and T n,0mˆ1[ ] forces n / J 2 (A). Define σ 2n+1 = T n,0mˆ1[τ 2n+1 ] where τ 2n+1 = the least string τ for which (a) holds, if appropriate and otherwise =.

20 Note: In case (a), σ 2n+1 T n,0mˆ1(τ 2n+1 ) will give n J 2 (A) by virtue of n, s W σ 2n+1 j and n, s ± 1 / W σ 2n+1 j giving n, s ± 1 / Wj σ, any σ σ 2n+1. But From case (b) may get n, s W σ p+1 some p 2n but n, s ± 1 / W σ p+1 j so n J 2 (A) again. j,, any p And Cannot in case (b) treat the cases: (i) n, s W σ j, some σ σ 2n, (ii) n, s / W σ j, any σ σ 2n, differently to get n J 2 (A) n J 2 (σ 2n+1 ), since could not then retrieve σ 2n+1 from J 2 (A). Consequently Following case (b), the forcing of n / J 2 (A) is current at all stages 2p + 2 > 2n + 1 for which there is no existing n, s W σ 2p j,p, with s p.

21 Stage 2n + 2. Check if there is a current forcing of any p / J 2 (A), for which p, s W σ 2n+1 j,n, some s n and which now ceases to be active Choose the least π σ 2n+1 for which some p, s ± 1 Wj, π π, each such p And define σ 2n+2 = πˆc(n). Notice It now follows that in case (b) of stage 2n + 1 in which such a τ does not exist one has n / J 2 (A) by virtue of n / J 2 (σ), all σ σ 2p+2, some p n. One needs to check that the construction can be carried out which means verifying that m exists in the definition of σ 2n+1.

22 To see this first notice that S is Σ 2 and so c.e. in where S is defined by S = {m ( τ)( s)[t n,0mˆ1[τ] forces n J 2 (A) at level s + 1]}. If S is finite then there is some m X S so m X and ( τ)( s)[t n,0mˆ1[τ] does not force n J 2 (A) at level s + 1] Giving m X and T n,0mˆ1[ ] forces n / J 2 (A) which is (b). And if S is infinite there is some m S X, since X is -immune. So for this m one has m / X and ( τ)( s)[t n,0mˆ1[τ] forces n J 2 (A) at level s + 1] giving (a).

23 Now verify the following sequence of facts (1) {σ p } p 0 T C. This is because stage 2n + 1 can be carried out computably in X T C And stage 2n + 2 is executed computably, apart from the coding of C(n) into σ 2n+2. Hence: (2) A X T C ; and (3) W i (W A j ) T C Since for each n 0, m in stage 2n + 1 is retrievable from σ 2n and A and n W i (W A j ) σ 2n+1 > σ 2nˆ0 mˆ1. To see this, first notice that

24 σ 2n+1 > σ 2nˆ0 mˆ1 m / X & ( τ, s)[t n,0mˆ1[τ] forces n J 2 (A) at level s + 1] m / X & ( s)[ n, s W j (T n,0mˆ1(τ 2n+1 )) & ( τ τ 2n+1 )( n, s ± 1 / W j (T n,0mˆ1(τ )))] m / X & ( Y T n,0mˆ1(τ 2n+1 ))(n W i (W Y j )) n W i (W A j ). Conversely, if n W i (Wj A ) there exists a y such that n, y Wj A and n, y ± 1 / Wj A. This means that case (b) cannot apply at stage 2n + 1 since then the forcing of n / J 2 (A) would cease to be active at some stage 2p + 2 > 2n + 1 giving n, y ± 1 W A j But this means that at stage 2n + 1 one chooses τ 2n+1 so that T n,0mˆ1[τ 2n+1 ] forces n J 2 (A) at level y + 1 so σ 2n+1 > σ 2nˆ0 mˆ1, as required. Also

25 (4) C T {σ p } p 0 Since one has C(n) = σ 2n+2 ( σ 2n+2 1), each n 0. (5) {σ p } p 0 T A X. To reproduce stage 2n + 1 of the construction, one can use σ 2n and A to find m And then check whether m X or not to see which of cases (a) or (b) apply at stage 2n + 1. If m X, so (b) applies, one has τ 2n+1 =. So T n,0mˆ1(τ 2n+1 ) = σ 2nˆ0 mˆ1. If m / X so (a) applies one can find T n,0mˆ1(τ 2n+1 ) σ 2nˆ0 mˆ1 with help from A. And then σ 2n+1 = T n,0mˆ1(τ 2n+1 ). And to reproduce stage 2n + 2 of the construction, one can computably obtain π And get σ 2n+1 = πˆa( π ).

26 (6) {σ p } p 0 T W i (W A j ). To verify this, first notice that since J 2 is a 2-CEA operator one has A T W A j and W A j T W i (W A j ). To carry out stage 2n + 1 one can find m from σ 2n and A verify whether n W i (W A j ) so as to see if one is in case (a) or (b) and find T n,0mˆ1(τ 2n+1 ), and hence σ 2n+1, with help from A and W A j. While one can carry out stage 2n + 2 computably as far as obtaining π and then σ 2n+2 = πˆa( π ). So from (5) and (6) one gets: (7) C T W i (W A j ) and A X. Combining (2), (3) and (7) the theorem follows. Note: The basic jump-join theorem is sufficient for a natural Turing definition of the jump. But a local version is needed to provide that of the relation of computably enumerable in, which applies to 2-CEA operators derived from special d.c.e. sets

An effective perfect-set theorem

An effective perfect-set theorem An effective perfect-set theorem David Belanger, joint with Keng Meng (Selwyn) Ng CTFM 2016 at Waseda University, Tokyo Institute for Mathematical Sciences National University of Singapore The perfect

More information

A DNC function that computes no effectively bi-immune set

A DNC function that computes no effectively bi-immune set A DNC function that computes no effectively bi-immune set Achilles A. Beros Laboratoire d Informatique de Nantes Atlantique, Université de Nantes July 5, 204 Standard Definitions Definition f is diagonally

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Cupping and noncupping in the enumeration degrees of Σ 0 2 sets

Cupping and noncupping in the enumeration degrees of Σ 0 2 sets Cupping and noncupping in the enumeration degrees of Σ 0 2 sets S. Barry Cooper School of Mathematics, University of Leeds LS2 9JT, England Andrea Sorbi Department of Mathematics, University of Siena 53100

More information

Development Separation in Lambda-Calculus

Development Separation in Lambda-Calculus Development Separation in Lambda-Calculus Hongwei Xi Boston University Work partly funded by NSF grant CCR-0229480 Development Separation in Lambda-Calculus p.1/26 Motivation for the Research To facilitate

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

Sy D. Friedman. August 28, 2001

Sy D. Friedman. August 28, 2001 0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such

More information

Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus

Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus University of Cambridge 2017 MPhil ACS / CST Part III Category Theory and Logic (L108) Brief Notes on the Category Theoretic Semantics of Simply Typed Lambda Calculus Andrew Pitts Notation: comma-separated

More information

arxiv: v1 [math.co] 31 Mar 2009

arxiv: v1 [math.co] 31 Mar 2009 A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of

More information

3 The Model Existence Theorem

3 The Model Existence Theorem 3 The Model Existence Theorem Although we don t have compactness or a useful Completeness Theorem, Henkinstyle arguments can still be used in some contexts to build models. In this section we describe

More information

Lattices and the Knaster-Tarski Theorem

Lattices and the Knaster-Tarski Theorem Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Generalising the weak compactness of ω

Generalising the weak compactness of ω Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak

More information

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition. The Real Numbers Here we show one way to explicitly construct the real numbers R. First we need a definition. Definitions/Notation: A sequence of rational numbers is a funtion f : N Q. Rather than write

More information

Strongly compact Magidor forcing.

Strongly compact Magidor forcing. Strongly compact Magidor forcing. Moti Gitik June 25, 2014 Abstract We present a strongly compact version of the Supercompact Magidor forcing ([3]). A variation of it is used to show that the following

More information

arxiv: v2 [math.lo] 13 Feb 2014

arxiv: v2 [math.lo] 13 Feb 2014 A LOWER BOUND FOR GENERALIZED DOMINATING NUMBERS arxiv:1401.7948v2 [math.lo] 13 Feb 2014 DAN HATHAWAY Abstract. We show that when κ and λ are infinite cardinals satisfying λ κ = λ, the cofinality of the

More information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence

More information

On the Lower Arbitrage Bound of American Contingent Claims

On the Lower Arbitrage Bound of American Contingent Claims On the Lower Arbitrage Bound of American Contingent Claims Beatrice Acciaio Gregor Svindland December 2011 Abstract We prove that in a discrete-time market model the lower arbitrage bound of an American

More information

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF

Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster

More information

On the Number of Permutations Avoiding a Given Pattern

On the Number of Permutations Avoiding a Given Pattern On the Number of Permutations Avoiding a Given Pattern Noga Alon Ehud Friedgut February 22, 2002 Abstract Let σ S k and τ S n be permutations. We say τ contains σ if there exist 1 x 1 < x 2

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

LECTURE 2: MULTIPERIOD MODELS AND TREES

LECTURE 2: MULTIPERIOD MODELS AND TREES LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

being saturated Lemma 0.2 Suppose V = L[E]. Every Woodin cardinal is Woodin with.

being saturated Lemma 0.2 Suppose V = L[E]. Every Woodin cardinal is Woodin with. On NS ω1 being saturated Ralf Schindler 1 Institut für Mathematische Logik und Grundlagenforschung, Universität Münster Einsteinstr. 62, 48149 Münster, Germany Definition 0.1 Let δ be a cardinal. We say

More information

MITCHELL S THEOREM REVISITED. Contents

MITCHELL S THEOREM REVISITED. Contents MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no

More information

TR : Knowledge-Based Rational Decisions and Nash Paths

TR : Knowledge-Based Rational Decisions and Nash Paths City University of New York (CUNY) CUNY Academic Works Computer Science Technical Reports Graduate Center 2009 TR-2009015: Knowledge-Based Rational Decisions and Nash Paths Sergei Artemov Follow this and

More information

Semantics and Verification of Software

Semantics and Verification of Software Semantics and Verification of Software Thomas Noll Software Modeling and Verification Group RWTH Aachen University http://moves.rwth-aachen.de/teaching/ws-1718/sv-sw/ Recap: CCPOs and Continuous Functions

More information

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2

6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Review Examples of Pure Strategy Nash Equilibria Mixed Strategies

More information

FORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper.

FORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper. FORCING AND THE HALPERN-LÄUCHLI THEOREM NATASHA DOBRINEN AND DAN HATHAWAY Abstract. We will show the various effects that forcing has on the Halpern-Läuchli Theorem. We will show that the the theorem at

More information

Logic and Artificial Intelligence Lecture 24

Logic and Artificial Intelligence Lecture 24 Logic and Artificial Intelligence Lecture 24 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

EXTENSIVE AND NORMAL FORM GAMES

EXTENSIVE AND NORMAL FORM GAMES EXTENSIVE AND NORMAL FORM GAMES Jörgen Weibull February 9, 2010 1 Extensive-form games Kuhn (1950,1953), Selten (1975), Kreps and Wilson (1982), Weibull (2004) Definition 1.1 A finite extensive-form game

More information

Unary PCF is Decidable

Unary PCF is Decidable Unary PCF is Decidable Ralph Loader Merton College, Oxford November 1995, revised October 1996 and September 1997. Abstract We show that unary PCF, a very small fragment of Plotkin s PCF [?], has a decidable

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

Permutation Factorizations and Prime Parking Functions

Permutation Factorizations and Prime Parking Functions Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,

More information

Mathematics Notes for Class 12 chapter 1. Relations and Functions

Mathematics Notes for Class 12 chapter 1. Relations and Functions 1 P a g e Mathematics Notes for Class 12 chapter 1. Relations and Functions Relation If A and B are two non-empty sets, then a relation R from A to B is a subset of A x B. If R A x B and (a, b) R, then

More information

4 Martingales in Discrete-Time

4 Martingales in Discrete-Time 4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1

More information

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES 0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations

More information

2 Deduction in Sentential Logic

2 Deduction in Sentential Logic 2 Deduction in Sentential Logic Though we have not yet introduced any formal notion of deductions (i.e., of derivations or proofs), we can easily give a formal method for showing that formulas are tautologies:

More information

Notes on Natural Logic

Notes on Natural Logic Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation

More information

LARGE CARDINALS AND L-LIKE UNIVERSES

LARGE CARDINALS AND L-LIKE UNIVERSES LARGE CARDINALS AND L-LIKE UNIVERSES SY D. FRIEDMAN There are many different ways to extend the axioms of ZFC. One way is to adjoin the axiom V = L, asserting that every set is constructible. This axiom

More information

Undecidability and 1-types in Intervals of the Computably Enumerable Degrees

Undecidability and 1-types in Intervals of the Computably Enumerable Degrees Undecidability and 1-types in Intervals of the Computably Enumerable Degrees Klaus Ambos-Spies Mathematisches Institut, Universität Heidelberg, D-69120 Heidelberg, Germany Denis R. Hirschfeldt Department

More information

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,

More information

Best response cycles in perfect information games

Best response cycles in perfect information games P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski

More information

UNIVERSITY OF OSLO. Faculty of Mathematics and Natural Sciences

UNIVERSITY OF OSLO. Faculty of Mathematics and Natural Sciences UNIVERSITY OF OSLO Faculty of Mathematics and Natural Sciences Examination in MAT2700 Introduction to mathematical finance and investment theory. Day of examination: Monday, December 14, 2015. Examination

More information

Compositional Models in Valuation-Based Systems

Compositional Models in Valuation-Based Systems Appeared in: Belief Functions: Theory and Applications, T. Denoeux and M.-H. Masson (eds.), Advances in Intelligent and Soft Computing 164, 2012, pp. 221--228, Springer-Verlag, Berlin. Compositional Models

More information

Inversion Formulae on Permutations Avoiding 321

Inversion Formulae on Permutations Avoiding 321 Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. chenpingge@hnu.edu.cn Suijie Wang College of Mathematics and Econometrics

More information

Extender based forcings, fresh sets and Aronszajn trees

Extender based forcings, fresh sets and Aronszajn trees Extender based forcings, fresh sets and Aronszajn trees Moti Gitik August 31, 2011 Abstract Extender based forcings are studied with respect of adding branches to Aronszajn trees. We construct a model

More information

Decidability and Recursive Languages

Decidability and Recursive Languages Decidability and Recursive Languages Let L (Σ { }) be a language, i.e., a set of strings of symbols with a finite length. For example, {0, 01, 10, 210, 1010,...}. Let M be a TM such that for any string

More information

CS792 Notes Henkin Models, Soundness and Completeness

CS792 Notes Henkin Models, Soundness and Completeness CS792 Notes Henkin Models, Soundness and Completeness Arranged by Alexandra Stefan March 24, 2005 These notes are a summary of chapters 4.5.1-4.5.5 from [1]. 1 Review indexed family of sets: A s, where

More information

Silver type theorems for collapses.

Silver type theorems for collapses. Silver type theorems for collapses. Moti Gitik May 19, 2014 The classical theorem of Silver states that GCH cannot break for the first time over a singular cardinal of uncountable cofinality. On the other

More information

Development Separation in Lambda-Calculus

Development Separation in Lambda-Calculus WoLLIC 2005 Preliminary Version Development Separation in Lambda-Calculus Hongwei Xi 1,2 Computer Science Department Boston University Boston, Massachusetts, USA Abstract We present a proof technique in

More information

ADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction

ADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction ADDING A LOT OF COHEN REALS BY ADDING A FEW II MOTI GITIK AND MOHAMMAD GOLSHANI Abstract. We study pairs (V, V 1 ), V V 1, of models of ZF C such that adding κ many Cohen reals over V 1 adds λ many Cohen

More information

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,

More information

HEIKE MILDENBERGER AND SAHARON SHELAH

HEIKE MILDENBERGER AND SAHARON SHELAH A VERSION OF κ-miller FORCING HEIKE MILDENBERGER AND SAHARON SHELAH Abstract. Let κ be an uncountable cardinal such that 2 ω, 2 2

More information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information

More information

A class of coherent risk measures based on one-sided moments

A class of coherent risk measures based on one-sided moments A class of coherent risk measures based on one-sided moments T. Fischer Darmstadt University of Technology November 11, 2003 Abstract This brief paper explains how to obtain upper boundaries of shortfall

More information

A Translation of Intersection and Union Types

A Translation of Intersection and Union Types A Translation of Intersection and Union Types for the λ µ-calculus Kentaro Kikuchi RIEC, Tohoku University kentaro@nue.riec.tohoku.ac.jp Takafumi Sakurai Department of Mathematics and Informatics, Chiba

More information

On Existence of Equilibria. Bayesian Allocation-Mechanisms

On Existence of Equilibria. Bayesian Allocation-Mechanisms On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

Philipp Moritz Lücke

Philipp Moritz Lücke Σ 1 -partition properties Philipp Moritz Lücke Mathematisches Institut Rheinische Friedrich-Wilhelms-Universität Bonn http://www.math.uni-bonn.de/people/pluecke/ Logic & Set Theory Seminar Bristol, 14.02.2017

More information

The Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d)

The Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d) The Traveling Salesman Problem We are given n cities 1, 2,..., n and integer distances d ij between any two cities i and j. Assume d ij = d ji for convenience. The traveling salesman problem (tsp) asks

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

Outline of Lecture 1. Martin-Löf tests and martingales

Outline of Lecture 1. Martin-Löf tests and martingales Outline of Lecture 1 Martin-Löf tests and martingales The Cantor space. Lebesgue measure on Cantor space. Martin-Löf tests. Basic properties of random sequences. Betting games and martingales. Equivalence

More information

Approximate Revenue Maximization with Multiple Items

Approximate Revenue Maximization with Multiple Items Approximate Revenue Maximization with Multiple Items Nir Shabbat - 05305311 December 5, 2012 Introduction The paper I read is called Approximate Revenue Maximization with Multiple Items by Sergiu Hart

More information

Lossy compression of permutations

Lossy compression of permutations Lossy compression of permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Wang, Da, Arya Mazumdar,

More information

Lecture 14: Basic Fixpoint Theorems (cont.)

Lecture 14: Basic Fixpoint Theorems (cont.) Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E

More information

Maximally Consistent Extensions

Maximally Consistent Extensions Chapter 4 Maximally Consistent Extensions Throughout this chapter we require that all formulae are written in Polish notation and that the variables are amongv 0,v 1,v 2,... Recall that by the PRENEX NORMAL

More information

Gödel algebras free over finite distributive lattices

Gödel algebras free over finite distributive lattices TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria

More information

Interpolation of κ-compactness and PCF

Interpolation of κ-compactness and PCF Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has

More information

Existentially closed models of the theory of differential fields with a cyclic automorphism

Existentially closed models of the theory of differential fields with a cyclic automorphism Existentially closed models of the theory of differential fields with a cyclic automorphism University of Tsukuba September 15, 2014 Motivation Let C be any field and choose an arbitrary element q C \

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

École normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P.

École normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P. École normale supérieure, MPRI, M2 Year 2007/2008 Course 2-6 Abstract interpretation: application to verification and static analysis P. Cousot Questions and answers of the partial exam of Friday November

More information

New tools of set-theoretic homological algebra and their applications to modules

New tools of set-theoretic homological algebra and their applications to modules New tools of set-theoretic homological algebra and their applications to modules Jan Trlifaj Univerzita Karlova, Praha Workshop on infinite-dimensional representations of finite dimensional algebras Manchester,

More information

CS 4110 Programming Languages & Logics. Lecture 2 Introduction to Semantics

CS 4110 Programming Languages & Logics. Lecture 2 Introduction to Semantics CS 4110 Programming Languages & Logics Lecture 2 Introduction to Semantics 29 August 2012 Announcements 2 Wednesday Lecture Moved to Thurston 203 Foster Office Hours Today 11a-12pm in Gates 432 Mota Office

More information

Introduction to Game Theory:

Introduction to Game Theory: Introduction to Game Theory: Cooperative Game Theory Version 10/29/17 The Two Branches of Game Theory In non-cooperative game theory, a game model is a detailed description of all the moves available to

More information

COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants

COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants Due Wednesday March 12, 2014. CS 20 students should bring a hard copy to class. CSCI

More information

Martingales. by D. Cox December 2, 2009

Martingales. by D. Cox December 2, 2009 Martingales by D. Cox December 2, 2009 1 Stochastic Processes. Definition 1.1 Let T be an arbitrary index set. A stochastic process indexed by T is a family of random variables (X t : t T) defined on a

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

Semantics with Applications 2b. Structural Operational Semantics

Semantics with Applications 2b. Structural Operational Semantics Semantics with Applications 2b. Structural Operational Semantics Hanne Riis Nielson, Flemming Nielson (thanks to Henrik Pilegaard) [SwA] Hanne Riis Nielson, Flemming Nielson Semantics with Applications:

More information

The (λ, κ)-fn and the order theory of bases in boolean algebras

The (λ, κ)-fn and the order theory of bases in boolean algebras The (λ, κ)-fn and the order theory of bases in boolean algebras David Milovich Texas A&M International University david.milovich@tamiu.edu http://www.tamiu.edu/ dmilovich/ June 2, 2010 BLAST 1 / 22 The

More information

UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES

UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES JOHN BALDWIN, DAVID KUEKER, AND MONICA VANDIEREN Abstract. Grossberg and VanDieren have started a program to develop a stability theory for

More information

Hierarchical Exchange Rules and the Core in. Indivisible Objects Allocation

Hierarchical Exchange Rules and the Core in. Indivisible Objects Allocation Hierarchical Exchange Rules and the Core in Indivisible Objects Allocation Qianfeng Tang and Yongchao Zhang January 8, 2016 Abstract We study the allocation of indivisible objects under the general endowment

More information

Level by Level Inequivalence, Strong Compactness, and GCH

Level by Level Inequivalence, Strong Compactness, and GCH Level by Level Inequivalence, Strong Compactness, and GCH Arthur W. Apter Department of Mathematics Baruch College of CUNY New York, New York 10010 USA and The CUNY Graduate Center, Mathematics 365 Fifth

More information

Math-Stat-491-Fall2014-Notes-V

Math-Stat-491-Fall2014-Notes-V Math-Stat-491-Fall2014-Notes-V Hariharan Narayanan December 7, 2014 Martingales 1 Introduction Martingales were originally introduced into probability theory as a model for fair betting games. Essentially

More information

The Value of Information in Central-Place Foraging. Research Report

The Value of Information in Central-Place Foraging. Research Report The Value of Information in Central-Place Foraging. Research Report E. J. Collins A. I. Houston J. M. McNamara 22 February 2006 Abstract We consider a central place forager with two qualitatively different

More information

Building Infinite Processes from Regular Conditional Probability Distributions

Building Infinite Processes from Regular Conditional Probability Distributions Chapter 3 Building Infinite Processes from Regular Conditional Probability Distributions Section 3.1 introduces the notion of a probability kernel, which is a useful way of systematizing and extending

More information

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS

LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS LECTURE 3: FREE CENTRAL LIMIT THEOREM AND FREE CUMULANTS Recall from Lecture 2 that if (A, φ) is a non-commutative probability space and A 1,..., A n are subalgebras of A which are free with respect to

More information

Smoothed Analysis of Binary Search Trees

Smoothed Analysis of Binary Search Trees Smoothed Analysis of Binary Search Trees Bodo Manthey and Rüdiger Reischuk Universität zu Lübeck, Institut für Theoretische Informatik Ratzeburger Allee 160, 23538 Lübeck, Germany manthey/reischuk@tcs.uni-luebeck.de

More information

STRONGLY UNFOLDABLE CARDINALS MADE INDESTRUCTIBLE

STRONGLY UNFOLDABLE CARDINALS MADE INDESTRUCTIBLE The Journal of Symbolic Logic Volume 73, Number 4, Dec. 2008 STRONGLY UNFOLDABLE CARDINALS MADE INDESTRUCTIBLE THOMAS A. JOHNSTONE Abstract. I provide indestructibility results for large cardinals consistent

More information

Cost Sharing in a Job Scheduling Problem

Cost Sharing in a Job Scheduling Problem Cost Sharing in a Job Scheduling Problem Debasis Mishra Bharath Rangarajan April 19, 2005 Abstract A set of jobs need to be served by a server which can serve only one job at a time. Jobs have processing

More information

A Property Equivalent to n-permutability for Infinite Groups

A Property Equivalent to n-permutability for Infinite Groups Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar

More information

Outline. 1 Introduction. 2 Algorithms. 3 Examples. Algorithm 1 General coordinate minimization framework. 1: Choose x 0 R n and set k 0.

Outline. 1 Introduction. 2 Algorithms. 3 Examples. Algorithm 1 General coordinate minimization framework. 1: Choose x 0 R n and set k 0. Outline Coordinate Minimization Daniel P. Robinson Department of Applied Mathematics and Statistics Johns Hopkins University November 27, 208 Introduction 2 Algorithms Cyclic order with exact minimization

More information

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Ahmed Khoumsi and Hicham Chakib Dept. Electrical & Computer Engineering, University of Sherbrooke, Canada Email:

More information

Lecture 12. Some Useful Continuous Distributions. The most important continuous probability distribution in entire field of statistics.

Lecture 12. Some Useful Continuous Distributions. The most important continuous probability distribution in entire field of statistics. ENM 207 Lecture 12 Some Useful Continuous Distributions Normal Distribution The most important continuous probability distribution in entire field of statistics. Its graph, called the normal curve, is

More information

Mixed Strategies. Samuel Alizon and Daniel Cownden February 4, 2009

Mixed Strategies. Samuel Alizon and Daniel Cownden February 4, 2009 Mixed Strategies Samuel Alizon and Daniel Cownden February 4, 009 1 What are Mixed Strategies In the previous sections we have looked at games where players face uncertainty, and concluded that they choose

More information

No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate

No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Fuzzy Optim Decis Making 217 16:221 234 DOI 117/s17-16-9246-8 No-arbitrage theorem for multi-factor uncertain stock model with floating interest rate Xiaoyu Ji 1 Hua Ke 2 Published online: 17 May 216 Springer

More information

INTERIM CORRELATED RATIONALIZABILITY IN INFINITE GAMES

INTERIM CORRELATED RATIONALIZABILITY IN INFINITE GAMES INTERIM CORRELATED RATIONALIZABILITY IN INFINITE GAMES JONATHAN WEINSTEIN AND MUHAMET YILDIZ A. We show that, under the usual continuity and compactness assumptions, interim correlated rationalizability

More information