A DNC function that computes no effectively bi-immune set

Similar documents
The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper

An effective perfect-set theorem

Lecture l(x) 1. (1) x X

Gödel algebras free over finite distributive lattices

June 11, Dynamic Programming( Weighted Interval Scheduling)

The Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d)

3 The Model Existence Theorem

FORCING AND THE HALPERN-LÄUCHLI THEOREM. 1. Introduction This document is a continuation of [1]. It is intended to be part of a larger paper.

arxiv: v2 [math.lo] 13 Feb 2014

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1)

Best response cycles in perfect information games

arxiv: v1 [math.co] 31 Mar 2009

Introduction to Greedy Algorithms: Huffman Codes

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

being saturated Lemma 0.2 Suppose V = L[E]. Every Woodin cardinal is Woodin with.

Sy D. Friedman. August 28, 2001

Generalising the weak compactness of ω

Outline. Objective. Previous Results Our Results Discussion Current Research. 1 Motivation. 2 Model. 3 Results

0.1 Equivalence between Natural Deduction and Axiomatic Systems

Structural Induction

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals

Course Information and Introduction

On the Optimality of a Family of Binary Trees Techical Report TR

Undecidability and 1-types in Intervals of the Computably Enumerable Degrees

maps 1 to 5. Similarly, we compute (1 2)(4 7 8)(2 1)( ) = (1 5 8)(2 4 7).

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages

Generalization by Collapse

PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley

Semantics and Verification of Software

Expectations. Definition Let X be a discrete rv with set of possible values D and pmf p(x). The expected value or mean value of X, denoted by E(X ) or

Strong normalisation and the typed lambda calculus

Algorithms PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. binary heaps d-ary heaps binomial heaps Fibonacci heaps

Game Theory Fall 2003

Cupping and noncupping in the enumeration degrees of Σ 0 2 sets

Sequential allocation of indivisible goods

Characterizing large cardinals in terms of layered partial orders

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.

6.854J / J Advanced Algorithms Fall 2008

PhD Qualifier Examination

Chain conditions, layered partial orders and weak compactness

Schnorr trivial sets and truth-table reducibility

1 Solutions to Tute09

MATH 121 GAME THEORY REVIEW

Copyright (C) 2001 David K. Levine This document is an open textbook; you can redistribute it and/or modify it under the terms of version 1 of the

ADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction

Notes on Natural Logic

Copyright 1973, by the author(s). All rights reserved.

Lecture 10: The knapsack problem

V. Fields and Galois Theory

10.1 Elimination of strictly dominated strategies

Decidability and Recursive Languages

Quadrant marked mesh patterns in 123-avoiding permutations

Math-Stat-491-Fall2014-Notes-V

Unary PCF is Decidable

Finding Equilibria in Games of No Chance

INFLATION OF FINITE LATTICES ALONG ALL-OR-NOTHING SETS TRISTAN HOLMES J. B. NATION

Lecture 7: Bayesian approach to MAB - Gittins index

Yao s Minimax Principle

TR : Knowledge-Based Rational Decisions

PARTITIONS OF 2 ω AND COMPLETELY ULTRAMETRIZABLE SPACES

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages

CS360 Homework 14 Solution

Risk-neutral Binomial Option Valuation

Philipp Moritz Lücke

CSE 417 Algorithms. Huffman Codes: An Optimal Data Compression Method

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Splay Trees Date: 9/27/16

MATH 116: Material Covered in Class and Quiz/Exam Information

4 Martingales in Discrete-Time

IEOR E4004: Introduction to OR: Deterministic Models

COMPARING NOTIONS OF RANDOMNESS

arxiv:math/ v1 [math.lo] 9 Dec 2006

LECTURE 2: MULTIPERIOD MODELS AND TREES

On Finite Strategy Sets for Finitely Repeated Zero-Sum Games

CS792 Notes Henkin Models, Soundness and Completeness

TR : Knowledge-Based Rational Decisions and Nash Paths

Admissibility in Quantitative Graph Games

HEIKE MILDENBERGER AND SAHARON SHELAH

Quality Sensitive Price Competition in. Secondary Market Spectrum Oligopoly- Multiple Locations

Generating all nite modular lattices of a given size

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL)

Extender based forcings, fresh sets and Aronszajn trees

Supporting Information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

An orderly algorithm to enumerate finite (semi)modular lattices

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.

Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees

Counting Basics. Venn diagrams

Statistics for Managers Using Microsoft Excel 7 th Edition

Game Theory: Normal Form Games

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants

Conditional Rewriting

Design and Analysis of Algorithms 演算法設計與分析. Lecture 9 November 19, 2014 洪國寶

Blackwell Optimality in Markov Decision Processes with Partial Observation

CARDINALITIES OF RESIDUE FIELDS OF NOETHERIAN INTEGRAL DOMAINS

SHORT EXTENDER FORCING

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference.

Outline. 1 Introduction. 2 Algorithms. 3 Examples. Algorithm 1 General coordinate minimization framework. 1: Choose x 0 R n and set k 0.

Transcription:

A DNC function that computes no effectively bi-immune set Achilles A. Beros Laboratoire d Informatique de Nantes Atlantique, Université de Nantes July 5, 204

Standard Definitions Definition f is diagonally non-computable if f (e) φ e (e). A is immune if A contains no infinite c.e. set. A is effectively immune if there is a computable (total) function, g such that W e A W e < g(e). A is bi-immune if A and A are both immune. A is effectively bi-immune (EBI) if A and A are both effectively immune. Note: If g and h witness effective immunity for A and A, respectively, then the function defined by k(x) = max{g(x), h(x)} witness effective immunity for both of them.

The Question and Answer In 989, Carl Jockusch proved that every DNC function computes an effectively immune set. In 202, Carl Jockusch and Andrew Lewis-Pye proved that every DNC function computes a bi-immune set. Can these results be combined? Jockusch and Lewis-Pye pose this question in their paper: Does every DNC function compute an effectively bi-immune set?

The Question and Answer In 989, Carl Jockusch proved that every DNC function computes an effectively immune set. In 202, Carl Jockusch and Andrew Lewis-Pye proved that every DNC function computes a bi-immune set. Can these results be combined? Jockusch and Lewis-Pye pose this question in their paper: Does every DNC function compute an effectively bi-immune set? The answer: No.

Results Theorem (Beros) There is a DNC function that computes no effectively bi-immune set. Corollary There is a 0 2 tree every branch of which is a DNC function that computes no effectively bi-immune set. Theorem (Kučera) Every 0 2 DNC degree computes a promptly simple set. Corollary There is a DNC function that computes no effectively bi-immune set and bounds a promptly simple set.

Overview Producing a DNC function is very easy: build a tree such that every level is a branching level.

Overview Producing a DNC function is very easy: build a tree such that every level is a branching level. For h, a branch of such a tree, to compute no EBI we must guarantee that, for every e N and for every computable function h, there is a c.e. set W a such that W a > h(a) and either W a W h e or W a W h e. This is the requirement for e and h.

Overview Producing a DNC function is very easy: build a tree such that every level is a branching level. For h, a branch of such a tree, to compute no EBI we must guarantee that, for every e N and for every computable function h, there is a c.e. set W a such that W a > h(a) and either W a W h e or W a W h e. This is the requirement for e and h. If the current outcome of a requirement is that there is a W a W f e, then the outcome can only be injured by a higher priority requirement as the computation is already complete.

Overview Producing a DNC function is very easy: build a tree such that every level is a branching level. For h, a branch of such a tree, to compute no EBI we must guarantee that, for every e N and for every computable function h, there is a c.e. set W a such that W a > h(a) and either W a W h e or W a W h e. This is the requirement for e and h. If the current outcome of a requirement is that there is a W a W f e, then the outcome can only be injured by a higher priority requirement as the computation is already complete. If the current outcome is that there is a W a W f e, then the outcome requires preservation from damage by lower priority requirements.

Overview Each requirement is assigned a set of roots. The roots can change a finite number of times, but they will always form a maximal antichain. The requirement can have different outcomes for each root.

Overview Each requirement is assigned a set of roots. The roots can change a finite number of times, but they will always form a maximal antichain. The requirement can have different outcomes for each root. The roots along a branch of the tree will adhere to the priority order and the roots of different requirements are disjoint. Root nodes for 3 requirements: Root of the 0 th requirement Root of the st requirement Root of the 2 nd requirement

Fix a root, σ, for the e, h requirement. For a finite set S we say σ accepts S for e if S W σ e. Conversely, σ preserves S for e if S W σ e.

Fix a root, σ, for the e, h requirement. For a finite set S we say σ accepts S for e if S W σ e. Conversely, σ preserves S for e if S W σ e. If W is a finite family, then a selection of W is a set that consists of one member from each member of W.

Fix a root, σ, for the e, h requirement. For a finite set S we say σ accepts S for e if S W σ e. Conversely, σ preserves S for e if S W σ e. If W is a finite family, then a selection of W is a set that consists of one member from each member of W. σ is -bad relative to W, m, e if σ accepts a selection of W for e. σ is (n + )-bad relative to W, m, e if σ has m immediate extensions that are n-bad relative to W, m, e.

n-bad for m = 3: A tree.

n-bad for m = 3: Suppose these nodes are -bad.

n-bad for m = 3: Three nodes are 2-bad. 2 2 2

n-bad for m = 3: One node is 3-bad. 3 2 2 2

n-bad for m = 3: The root is 4-bad. 4 3 2 2 2

A diagonalization point, d, is a code such that we can control the enumeration of W d (found using the recursion theorem).

A diagonalization point, d, is a code such that we can control the enumeration of W d (found using the recursion theorem). Let a N be a diagonalization point. Wait for h(a).

A diagonalization point, d, is a code such that we can control the enumeration of W d (found using the recursion theorem). Let a N be a diagonalization point. Wait for h(a). Pick further diagonalization points b 0,..., b h(a). Wait for h(b i ).

A diagonalization point, d, is a code such that we can control the enumeration of W d (found using the recursion theorem). Let a N be a diagonalization point. Wait for h(a). Pick further diagonalization points b 0,..., b h(a). Wait for h(b i ). Choose disjoint subsets of W σ e of size max{h(b i ) : i h(a)}. Each W bi is set equal to one of the sets for i h(a).

A diagonalization point, d, is a code such that we can control the enumeration of W d (found using the recursion theorem). Let a N be a diagonalization point. Wait for h(a). Pick further diagonalization points b 0,..., b h(a). Wait for h(b i ). Choose disjoint subsets of W σ e of size max{h(b i ) : i h(a)}. Each W bi is set equal to one of the sets for i h(a). Search for m sibling nodes, τ, immediately below σ that are k-bad relative to {W b0,..., W bh(a) }, m, e for some k and some well-chosen large value of m.

If we cannot find enough siblings, then we can avoid one of the W bi, preserving it in W σ e.

If we cannot find enough siblings, then we can avoid one of the W bi, preserving it in W σ e. If we can, then a lemma guarantees we can choose a highly branching tree below σ with enough redundancy to be safe from updated computations by roots that are prefixes of σ (unless outcomes change) and every branch accepts a particular selection of {W b0,..., W bh(a) }.

If we cannot find enough siblings, then we can avoid one of the W bi, preserving it in W σ e. If we can, then a lemma guarantees we can choose a highly branching tree below σ with enough redundancy to be safe from updated computations by roots that are prefixes of σ (unless outcomes change) and every branch accepts a particular selection of {W b0,..., W bh(a) }. Set W a to be the selection of points accepted by every branch. W a = h(a) + and W a is contained in the set computed by e with an oracle extending any branch in the trees.

Large Lemma For a finite set of finite sets, W, a string σ and e, k, y N, either:. there is a y-branching tree of depth k below σ, or 2. there are m = (y ) ( Π A W A ) + that are i-bad relative to W, m, e for i k.

Large Lemma For a finite set of finite sets, W, a string σ and e, k, y N, either:. there is a y-branching tree of depth k below σ, or 2. there are m = (y ) ( Π A W A ) + that are i-bad relative to W, m, e for i k. This allows us to predict the maximum amount of injury that higher priority requirements that are preserving a set can do to lower priority requirements that have accepted a set.

Large Lemma For a finite set of finite sets, W, a string σ and e, k, y N, either:. there is a y-branching tree of depth k below σ, or 2. there are m = (y ) ( Π A W A ) + that are i-bad relative to W, m, e for i k. This allows us to predict the maximum amount of injury that higher priority requirements that are preserving a set can do to lower priority requirements that have accepted a set. Using this, the strategy does not accept unless it has enough branching to be unharmed by the maximum amount of injury all higher priority requirements can inflict (before changing outcome).

Thank You