On a Quantitative Notion of Uniformity? Appeared In: MFCS'95, LNCS 969, 169{178, Springer{Verlag, 1995.
|
|
- Rhoda Glenn
- 6 years ago
- Views:
Transcription
1 169 On a Quantitative Notion of Uniformity? (Extended Abstract) Appeared In: MFCS'95, LNCS 969, 169{178, Springer{Verlag, Susanne Kaufmann??, Martin Kummer Institut fur Logik, Komplexitat und Deduktionssysteme, Universitat Karlsruhe, D-7618 Karlsruhe, Germany. fkaufmann; kummerg@ira.uka.de 1 Introduction Recent work on \Bounded Query Classes" in complexity theory and computability theory (see [5] for a survey) has sparked renewed interest in quantitative aspects of computability theory. A central result in this eld is the Nonspeedup Theorem [1, Theorem 9], which states that if any n parallel queries to a set A can be computed with n sequential queries to some oracle, then A must be recursive. More formally, for A! (! is the set of all natural numbers) and xed n 1, let Cn A(x 1; : : :; x n ) = ( A (x 1 ); : : :; A (x n )) denote the n-fold characteristic function of A. If there is an oracle B! such that C A n can be computed with n sequential queries to B, then A is recursive. (The bound on the number of queries is tight, i.e., n cannot be replaced by n + 1.) In [11] the analogous result for the n-place cardinality function # A n (x 1 ; : : :; x n ) = jfi : x i Agj is obtained (Cardinality Theorem). There is also a classical result of Trakhtenbrot [18] with a similar avor, concerning approximative computation of n distinct parallel queries to A: A set A is called (m; n)-recursive for 1 m n, if there is a recursive function f :! n! f0; 1g n (an \(m; n)-operator") such that for all pairwise distinct x 1 ; : : :; x n, f(x 1 ; : : :; x n ) and Cn A (x 1 ; : : :; x n ) agree in at least m components. Trakhtenbrot's Theorem states that every (m; n)-recursive set is recursive if m > n. (Again, this is tight, i.e., the theorem does not hold for m = b nc.) A typical point of these results is the nonuniform nature of their proofs: A set A is shown to be decidable, but no eective method for deciding A is provided. Beigel et al. [1] and Kinber [9, 10] proved that this nonuniformity is inevitable. More precisely, Kinber [10] proved that, given an index for f, there is no algorithm that computes the characteristic function (up to nitely many errors) of some set A which is (m; n)-recursive via f (if such A exists), even if m = n? 1. Thus, the following questions naturally arise: Do there exist two algorithms such that for every index at least one of them is successful? In general, what is the least number k depending on m; n such that there are k algorithms and for every index at least one of them is successful? This number can also be considered in two other ways. In a probabilistic interpretation, it tells us that A can be computed from an index of an (m; n)-operator with probability 1=k.? The complete version of this paper will appear in Fundamenta Informaticae.?? Supported by the Deutsche Forschungsgemeinschaft (DFG) grant Me 67/4-.
2 170 From the point of view of descriptional complexity, it tells us that dlog ke bits of additional information (to specify one of the k possibilities) are needed to compute A from an index of an (m; n)-operator. For a unied treatment of these questions we move to the domain of innite binary trees: It is known that each of the above theorems is equivalent to the statement that a certain natural class of recursive or r.e. trees has only recursive branches. These trees are also interesting in their own right. Owings [15] pointed out that the Nonspeedup Theorem is equivalent to the statement that every branch of an r.e. tree of bounded width is recursive. In this version the question of uniformity amounts to asking whether there is an algorithm that computes a branch from an index of the tree. While there is no uniformity in this strong sense, we get nontrivial positive results by weakening the concept of uniformity as indicated above: For some xed number k we want an algorithm which, given an index of a tree, outputs a list of k programs such that at least one of them computes a branch of the tree up to nitely many errors. Now the goal is to determine the least k for which this works. We show that, for r.e. trees of width at most n, the least possible k is n? 1. For trees arising from Trakhtenbrot's Theorem with parameters m; n we determine k = n? m + 1 as the optimal value. In addition, several other, related classes of trees will be investigated. The proofs of the upper bounds require re- nements of the proofs of the original theorems. The lower bounds are shown by suitable diagonalizations using the recursion theorem. Due to space limitations all proofs have been omitted, except, for illustration, a proof sketch of the upper bound of Theorem 13. The results of Sections 4, 5 originally appeared in [8] where additional material can be found. Very recently our results have been applied in inductive inference [4]. Notation and Denitions The notation is standard (see e.g., the textbooks [14, 16, 17]).! = f0; 1; ; : : :g. ' i is the i-th partial recursive function in the standard enumeration, W i! is the i-th r.e. set in the standard enumeration (W i = dom(' i )). For a given r.e. set A, let fa s g s! denote a recursive enumeration of A such that fa s g s! is a strong array, A s A s+1, and S s! A s = A, cf. [17, II..7]. P 1 is the set of all partial recursive one-place functions. R 1 is the set of all total recursive one-place functions. For functions f and g let f = g denote that f and g agree almost everywhere, i.e., (9x 0 )(8x x 0 )[f(x) = g(x)]. f y denotes the restriction of f to arguments x y. A is the characteristic function of A. We identify A with A, e.g., we write A(x) instead of A (x). f0; 1g is the set of nite strings of 0s and 1s. is the empty string. jtj denotes the length of string t. For instance, jj = 0. For strings t 1 and t we write t 1 t if t 1 is an initial segment of t. Let t(x) = b if x < jtj and b is the (x + 1)-th symbol of t. For t 1 ; t f0; 1g n, t 1 = e t means that t 1 and t disagree in at most e components. The concatenation of t 1 and t is denoted by t 1 t. A tree T is a subset of f0; 1g which is closed under initial segments. Note
3 171 that all of our trees are binary. t T is called a node of T. Let cod : f0; 1g!! be a recursive bijection. We often identify a tree T with the set fcod(t) : t T g. Then we say that T is r.e. if W i = fcod(t) : t T g for some i. Such an i is called a 1 -index of T. We say that a tree T is recursive if T is a recursive function, in which case i is called a 0 -index of T if ' i = T. f f0; 1g! is a branch of T if every nite initial segment of f is a node of T. We also say that A! is a branch of T if A is a branch of T. [T ] is the set of all branches of T. The degrees of branches of recursive trees were investigated intensively; see [7] as the basic reference. The width w(t ) of a tree T is the maximum number of nodes on any level, i.e., w(t ) = maxfjt \ f0; 1g n j : n 0g. B n = f0; 1g n is the full binary tree of depth n. A mapping g : B n! T is an embedding of B n into T if (8t)[jtj < n! [g(t0) g(t)0 ^ g(t1) g(t)1]]. rk(t ), the rank of T, is the maximal n such that B n is embeddable into T. For A; B! let A4B denote the symmetric dierence of A and B, i.e., A4B = (A n B) [ (B n A). For M! let (4M) = maxfja4bj : A; B Mg. For a tree T we write (4T ) instead of (4[T ]). A Weak Notion of Uniformity In this section we develop our notion of uniformity, provide a formal denition, and summarize our results. As a starting point consider the following search problem for a class A of recursive (or r.e.) trees. Search Problem for A Input: A 0 -index (or 1 -index) of a tree T A with [T ] 6= ;. Output: An index i of some branch A of T (i.e., ' i = A). This makes sense only if T has at least one recursive branch. For the classes A which we investigate in this paper, we have [T ] R 1, i.e., every branch is recursive. However, it turns out that the search problem for A is still algorithmically unsolvable, even if we allow the function ' i to make nitely many errors (i.e., ' i = A instead of ' i = A). Therefore we are led to the following weak version of the search problem. Weak k-search Problem for A Input: An index of a tree T A with [T ] 6= ;. Output: A list of k indices i 1 ; : : :; i k such that there is some 1 j k and some branch A of T with ' ij = A. In this version one has to produce k possibilities such that at least one of them is correct up to nitely many errors. A partial recursive solution g of the Weak k-search Problem for A is called a k-selector for A. Our goal is to determine the least k such that there is a k-selector for A. The following denition states all this formally. Denition1. Let A be a class of recursive [r.e.] trees. A function g P 1 is a k-selector for A if, whenever i is a 0 -index [ 1 -index] of T A with [T ] 6= ;,
4 17 there exist i 1 ; : : :; i k such that g(i) = hi 1 ; : : :; i k i and there is some 1 j k, and some A [T ], with ' ij = A. The least k such that there is a k-selector for A is denoted by sel(a). If no such k exists we write sel(a) = 1. Remarks: (1) We may assume that g is total recursive: By the s-m-n theorem there is a total recursive function h such that ' h(i;j) = ' ij if g(i) = hi 1 ; : : :; i k i^ 1 j k, otherwise ' h(i;j) is undened everywhere. Therefore we may replace g by the total recursive function g 0 (i) = hh(i; 1); : : :; h(i; k)i. () Also note that we get the same notion even if we only require g(i) to be an r.e. index of a nite set of size at most k which contains a correct index of a branch. We just dene h such that ' h(i;j) = ' z if z is the j-th element enumerated into W g(i) ; then we dene g 0 as above. We now introduce the classes of trees which are central to our investigation: Denition. D n := ft : T is a recursive tree and (4T ) ng. B n := ft : T is an r.e. tree with w(t ) ng. B r n := ft : T is a recursive tree with w(t ) ng. E n := ft : T is an r.e. tree with rk(t ) ng. E r n := ft : T is a recursive tree with rk(t ) ng. Trakhtenbrot [18], Owings[15], and Kummer [11, Lemma 1] proved that [T ] R 1 for T D n ; B n ; E n, respectively. It is easy to see that B n is a subclass of E n. D n is incomparable to the other classes. The weak search problems for D n ; B n, and E n turn out to be markedly dierent. For instance, while the weak search problems for D n and B n are eectively solvable, this is not the case for E n. Our quantitative results are summarized in the following table: A D n B n B r n E n E r n sel(a) d n+1 e n? 1 n 1 n + 1 It follows at once that sel(a) = 1 if A is the class of all recursive trees with (4T ) nite ( S n D n), the class of all recursive trees of nite width ( S n Br n ), or the class of all recursive trees of nite rank ( S n E n). r The results concerning D n, B n, E n are connected with the uniformity of Trakhtenbrot's Theorem, the Nonspeedup Theorem, and the Cardinality Theorem, respectively. We treat these classes and explain the connections in sections 3, 4, 5 below. Remarks: (1) The fact that sel(d 0 ) = 1 is well known: If a recursive tree has exactly one branch then this branch is (uniformly) recursive [17, VI.5.1]. () We do not consider the r.e. analogue of D n, because, even if an r.e. tree has a unique branch, this branch need not be recursive. Owings [15, p. 766] gave the following example: Let T := ft f0; 1g : (9s)[t (K s (0); : : :; K s (s))]g where fk s g s! is a recursive enumeration of the halting problem K. Then [T ] = fkg. (3) Note that j[t ]j n for every T Bn. r On the other hand, it is easy to see that,
5 173 for every recursive tree T with at most n branches, one can uniformly compute a recursive tree T 0 B r n with [T ] = [T 0 ]. Thus our results on the uniformity of B r n transfer to the class of all recursive trees with at most n branches. In particular, sel(a) = 1 for the class A of all recursive trees with nitely many branches. (4) The result that every branch of a tree of bounded width is recursive appears implicitly already in [13, p. 55 f.] where it is credited to A. R. Meyer. It is the key to the proof that an innite sequence f0; 1g! is recursive if the lengthconditional Kolmogorov complexity of all its initial segments is bounded by a constant. 3 Uniformity of Trakhtenbrot's Theorem In this section we investigate the uniformity of Trakhtenbrot's Theorem in relation to the class D n. Let us rst introduce some further notation. For any recursive function f :! n! f0; 1g n we call A! (m; n)-recursive via f i for all pairwise distinct x 1 ; : : :; x n we have C A n (x 1 ; : : :; x n ) = n?m f(x 1 ; : : :; x n ). Let T T m;n (f) denote the class of all sets that are (m; n)-recursive via f. 3.1 Previous Results We can state Trakhtenbrot's Theorem as follows: Theorem 3. (Trakhtenbrot [18]) Let n < m n and let f :!n! f0; 1g n be a recursive function. Then every set in T T m;n (f) is recursive. A more easily accessible reference for the proof of Theorem 3 is [6, Section 1]. A proof also falls out of Theorem 7 and Lemma 6 below. Theorem 3 also follows directly from Lemma 6 and the fact that every recursive tree with only countably many branches (but at least one) has a recursive branch [14, V.5.7] (see also the Tree Lemma of Owings in [15]). The question of uniformity for Theorem 3 leads to the following weak search problem (for xed k; m; n with n < m n). Weak k-uniformity Problem for Trakhtenbrot's Theorem with Parameters m; n Input: An index of f :! n! f0; 1g n with T T m;n (f) 6= ;. Output: A list of k indices i 1 ; : : :; i k such that ' ij = A for some 1 j k and some A T T m;n (f). This problem is uniformly equivalent to a weak search problem for a suitable class of recursive trees which we now dene (cf. [6, p. 683], [18]). It consists of all nite initial segments that are consistent with the (m; n)-operator f. Denition4. For any recursive function f :! n! f0; 1g n and m n let T m;n (f) := ft f0; 1g : (8x 1 < < x n < jtj)[(t(x 1 ); : : :; t(x n )) = n?m f(x 1 ; : : :; x n )]g: T m;n (f) is called an (m; n)-recursive tree (via f). Let A m;n denote the class of all (m; n)-recursive trees.
6 174 Note that the branches of T m;n (f) are exactly the sets which are (m; n)-recursive via f, i.e., [T m;n (f)] = T T m;n (f). From m; n and an index of f :! n! f0; 1g n we can uniformly compute a 0 -index of T m;n (f). Conversely, from m; n and a 0 -index of T m;n (f) we can compute an index of g :! n! f0; 1g n such that T m;n (g) = T m;n (f). (Dene g by induction on k for all n-tuples x 1 < < x n with x n = k.) Therefore, the Weak k-uniformity Problem for Trakhtenbrot's Theorem with Parameters m; n is uniformly equivalent to the Weak k-search Problem for A m;n. Kinber proved the rst lower bound on sel(a m;n ). His result can be restated as follows: Theorem 5. (Kinber [9, 10]) sel(a m;n ) > 1 for n < m < n. The connection between A m;n and D n is given by the following observation of Trakhtenbrot, which is essential for his proof of Theorem 3. Lemma 6. (Trakhtenbrot [18]) A m;n D (n?m) for n < m n. Remarks: (1) By an argument in [6, p. 683], we also have A m;n E r, for n?1 n < m n. () Fix m; n; k with n < m < n and k 1. It follows from Kinber's result that there is no k-selector g for A m;n which, given an innite tree T A m;n, produces at least one index i j such that ' ij [T ]: Otherwise, there would be a 1-selector for A m;n which rst computes g(i) = hi 1 ; : : :; i k i and then outputs an index of the following function f i : f i (x): Search for 1 j k with ' ij (z) # for all z x+1 and ' ij (x+1) T. Then let f i (x) := ' ij (x). Note that for suciently large x we have ' ij (x + 1) T only if ' ij is a branch of T. By Lemma 6, all branches of T which are equal to ' ij for some 1 j k agree from some point on. Hence f i makes only nitely many errors and gives us a 1-selector. By a similar argument, there can be no k-selector g and a xed error bound e! such that one of the ' ij computes a branch up to e errors. This shows that it would have been too restrictive not to allow a nite (and unbounded) number of errors in the denition of a k-selector. 3. Main Results The next result gives the exact value of sel(a m;n ): Theorem 7. sel(a m;n ) = n? m + 1 for n < m n. We shall organize the proof of this theorem in such a way that we get in addition the exact value of sel(d n ): Theorem 8. sel(d n ) = d n+1 e for n 0.
7 175 With Lemma 6 the plan for the proofs of Theorems 7, 8 is clear: We rst show the upper bound sel(d n ) d n+1 e. Then, using Lemma 6, we get the upper bound of Theorem 7: sel(a m;n ) sel(d (n?m) ) n? m + 1. Second, we show the lower bound sel(a m;n ) n? m + 1. Then, by Lemma 6, we get the lower bound of Theorem 8: k + 1 sel(a k+1;k+1 ) sel(d k ) sel(d k+1 ). 3.3 Total Selectors We would now like to point out a direct proof for sel(a m;n ) n? m + 1 which yields a stronger result and provides new insights into the structure of trees that arise from Trakhtenbrot's Theorem. To this end let sel t (A) be the least number k for which there is a k-selector for A such that at least one of the indices which it produces on input T A computes a branch of T almost everywhere and computes a total function. Clearly, sel t (A) sel(a). The next result shows that the bound in Theorem 7 also holds for total selectors. An analogous result holds for the tree classes B n ; B r n; E n ; E r n which we consider in the next sections. Theorem 9. sel t (A m;n ) = n? m + 1 for n < m n. The lower bound follows from Theorem 7. For the upper bound we need the following combinatorial notion. Denition10. A tree T has dimension d 0 (dim(t ) = d 0 ) if d 0 is the maximal number d such that there exist x 1 < < x d with (8v f0; 1g d )(9A [T ])[v = C A d (x 1; : : :; x d )]. If d 0 does not exist then dim(t ) := 1. Remark: In more technical terms dim(t ) is the Vapnik-Chervonenkis dimension of the concept class [T ]!. See [3] for more information on this notion; in [, Section ], [1, Theorem 6, Proposition 7] further recursion theoretic applications are given. Note that for every T A m;n we have dim(t ) n? m: If dim(t ) > n? m then choose x 1 < < x n?m+1 witnessing this fact. Suppose that T is an (m; n)-recursive tree via f. Let (b 1 ; : : :; b n ) = f(x 1 ; : : :; x n?m+1 ; x n?m+1 + 1; : : :; x n?m+1 +m?1). Now we can choose a branch A of T such that 1?A(x i ) = b i for 1 i n? m + 1. But this means that A is not (m; n)-recursive via f, a contradiction. The next lemma shows how the knowledge of the dimension of T can help to compute a branch of T. Lemma 11. Let T be an innite recursive tree with dim(t ) = d and (4T ) nite. Then, uniformly in a 0 -index of T, there is f K such that f= A for some A [T ], and in addition f is total.
8 176 The totality of the selector function is not guaranteed by the proof of the upper bound of Theorem 8, in which the correct f 0 a may be undened at two places. We close this section by showing that non-totality is essential for the upper bound sel(d n ) d n+1e: By the next result, sel t(d n ) is twice as large as sel(d n ). Theorem 1. sel t (D n ) = n + 1 for n 0. 4 Uniformity of the Nonspeedup Theorem - Trees of Bounded Width In this section we present optimal bounds for trees of bounded width. The main results are: Theorem 13. sel(b n ) = n? 1 for n 1. Theorem 14. sel(bn r ) = n for n 1. Proof sketch of the upper bound sel(b n ) n? 1: We proceed in two steps. First, we will show that sel(b n ) n(n+1) ; this will just be a uniform version of a proof of Owings in [15, p. 764]. Second, we will take a closer look at the selector that we have found and dene a rened version which, somewhat surprisingly, reduces the quadratic bound to a linear bound and gives us sel(b n ) n? 1. (1) sel(b n ) n(n+1) : For a tree T B n let L(T; k) := T \f0; 1g k (the k-th level of T ), a 0 := j[t ]j, and dene the supremal width as b 0 := maxfl : (9 1 k)[jl(t; k)j = l]g. We assume that a 0 > 0. Clearly, a 0 b 0 n. We prove that there is a uniform procedure f a0;b0 which, given a 0 ; b 0, and a 1 -index of T, computes a branch of T up to nitely many errors. Since there are n(n+1) possible pairs (a 0 ; b 0 ) this gives us an n(n+1) -selector for B n. () sel(b n ) n? 1: The idea is to \amalgamate" several f a;b -functions into one function. If (a; b) 6= (a 0 ; b 0 ) but dom(f a;b ) is nite then f a;b does not hurt in the amalgamation. Therefore we have to consider when dom(f a;b ) is nite. Claim: If (a 0 ; b 0 ) f(a; b); (a + c; b + c)g for some a; b; c > 0 then exactly one of dom(f a;b ) and dom(f a+c;b+c ) is innite. By the Claim, we are led to dene n?1 functions g a;b, for a = 1; and a b n, as follows: g a;b (x): Dovetail the computations of f a;b (x); f a+;b+1 (x); : : :; f a+c;b+c (x), where c is maximal with a + c b + c. As soon as a converging computation with output y appears, let g a;b (x) := y.
9 177 5 Uniformity of the Cardinality Theorem - Trees of Bounded Rank In this section we prove optimal bounds for trees of bounded rank and discuss the connection with the uniformity of the Cardinality Theorem. Theorem 15. sel(e 1 ) = 1. Theorem 16. sel(en r ) = n + 1 for n 0. The trees that arise in the Cardinality Theorem (CT) are a proper subclass of the r.e. trees of bounded rank. CT can be stated as follows [11]: Let A! and n 1. If there is a recursive function g :! n!! such that for every x 1 < < x n, (1) W g(x1;:::;xn) f0; 1; : : :; ng (note that it is a proper inclusion), () # A n (x 1; : : :; x n ) W g(x1;:::;xn), then A is recursive. For a given g as above we can dene a uniformly r.e. tree T g such that the branches of T g are just the sets A which satisfy conditions (1), (): T g = ft f0; 1g : (8x 1 < < x n )[x n < jtj! P n t(x i=1 i) W g(x1;:::;xn)]g: We say that T g arises from CT with parameter n. Let C n denote the class of all trees that arise from CT with parameter n. CT is proved by showing that the trees in C n have bounded rank. However, there are trees of bounded rank which do not belong to any C n. The class C is studied in greater detail in [8, 15]. It is shown in [8] that E 1 6 C E, and that, in contrast to Theorem 15, sel(c ) is nite (in fact, sel(c ) 6). It is not known whether sel(c n ) is nite for all n. From Theorem 16 we can derive a positive result for the uniformity of a weak version of CT (proved in [15]), in which W g(x1;:::;xn) is replaced by D g(x1;:::;xn) (D i is the i-th nite set in a canonical enumeration of all nite sets): Let Cn r denote the class of all recursive trees arising from this version of CT with parameter n. It is shown in [11] that the rank of every tree in C n is bounded by 4 n?. In particular, Cn r E r 4 n?. Thus, by Theorem 16, we get sel(cn r ) 4n? 1. 6 Conclusion We have introduced a new notion of uniformity to investigate the problem of how to compute a branch of a tree. We have obtained precise quantitative descriptions of the borderline between uniformity and nonuniformity for several interesting classes of trees. Furthermore, we were able to apply these ndings to central results of quantitative computability theory such as Trakhtenbrot's Theorem and the Nonspeedup Theorem. In this paper we have studied our quantitative notion of uniformity in a domain which in itself had a quantitative structure, namely classes of trees parameterized by natural numbers. It would be interesting to study this notion in other areas as well.
10 178 Acknowledgements: We would like to thank Bill Gasarch, Georgia Martin, and Frank Stephan for helpful comments. We are particularly indebted to Georgia Martin for proofreading and an extensive revision of our prose. References 1. R. Beigel, W. I. Gasarch, J. Gill, J. C. Owings, Jr. Terse, superterse, and verbose sets. Information and Computation, 103:68{85, R. Beigel, M. Kummer, F. Stephan. Quantifying the amount of verboseness. To appear in: Information and Computation. (A preliminary version appeared in: Lecture Notes in Computer Science, Vol. 60, pp. 1{3, 199.) 3. A. Blumer, A. Ehrenfeucht, D. Haussler, M. K. Warmuth. Learnability and the Vapnik-Chervonenkis dimension. Journal of the ACM, 36:99{966, J. Case, S. Kaufmann, E. Kinber, M. Kummer. Learning recursive functions from approximations. In: Proceedings of EuroCOLT'95. LNCS 904, 140{153, Springer- Verlag, W. I. Gasarch. Bounded queries in recursion theory: a survey. In Proceedings of the Sixth Annual Structure in Complexity Theory Conference. IEEE Computer Society Press, 6{78, V. Harizanov, M. Kummer, J. C. Owings, Jr. Frequency computation and the cardinality theorem. J. Symb. Log., 57:677{681, C. G. Jockusch, R. I. Soare. 0 1 classes and degrees of theories. Trans. Amer. Math. Soc., 173, 33{56, S. Kaufmann. Uniformitat bei rekursiv aufzahlbaren Baumen. Diplomarbeit, Fakultat fur Informatik, Universitat Karlsruhe, E. B. Kinber. On frequency calculations of general recursive predicates. Sov. Math. Dokl., 13:873{876, E. B. Kinber. Frequency-computable functions and frequency-enumerable sets. Candidate Dissertation, Riga, (in Russian) 11. M. Kummer. A proof of Beigel's cardinality conjecture. J. Symb. Log., 57:68{687, M. Kummer, F. Stephan. Recursion theoretic properties of frequency computation and bounded queries. To appear in: Information and Computation. (A preliminary version appeared in: Lecture Notes in Computer Science, Vol. 713, pp. 43{54, 1993.) 13. D. W. Loveland. A variant of the Kolmogorov concept of complexity. In: Information and Control, 15:510{56, P. Odifreddi. Classical Recursion Theory. North-Holland, Amsterdam, J. C. Owings. A cardinality version of Beigel's nonspeedup theorem. J. Symb. Log., 54:761{767, J. S. Royer, J. Case. Subrecursive Programming Systems: Complexity and Succinctness. Birkhauser-Verlag, Boston, R. I. Soare. Recursively Enumerable Sets and Degrees. Springer-Verlag, Berlin, B. A. Trakhtenbrot. On frequency computation of functions. Algebra i Logika, :5{3, (in Russian) This article was processed using the LaT E X macro package with LLNCS style
Learning Recursive Functions From Approximations
Sacred Heart University DigitalCommons@SHU Computer Science & Information Technology Faculty Publications Computer Science & Information Technology 8-1997 Learning Recursive Functions From Approximations
More informationLearning via Queries and Oracles. Frank Stephan. Universitat Karlsruhe
Learning via Queries and Oracles Frank Stephan Universitat Karlsruhe Abstract Inductive inference considers two types of queries: Queries to a teacher about the function to be learned and queries to a
More informationMartin-Lof Random and PA-complete Sets. Frank Stephan. Universitat Heidelberg. November Abstract
Martin-Lof Random and PA-complete Sets Frank Stephan Universitat Heidelberg November 2002 Abstract A set A is Martin-Lof random i the class fag does not have 0 1-measure 0. A set A is PA-complete if one
More informationA version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd
CDMTCS Research Report Series A Version of for which ZFC can not Predict a Single Bit Robert M. Solovay University of California at Berkeley CDMTCS-104 May 1999 Centre for Discrete Mathematics and Theoretical
More informationSUBSPACES OF COMPUTABLE VECTOR SPACES
SUBSPACES OF COMPUTABLE VECTOR SPACES RODNEY G. DOWNEY, DENIS R. HIRSCHFELDT, ASHER M. KACH, STEFFEN LEMPP, JOSEPH R. MILETI, AND ANTONIO MONTALB AN Abstract. We show that the existence of a nontrivial
More informationCone Avoidance of Some Turing Degrees
Journal of Mathematics Research; Vol. 9, No. 4; August 2017 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Cone Avoidance of Some Turing Degrees Patrizio Cintioli
More informationOn the non-existence of maximal inference degrees for language identification
On the non-existence of maximal inference degrees for language identification Sanjay Jain Institute of Systems Science National University of Singapore Singapore 0511 Republic of Singapore sanjay@iss.nus.sg
More informationA Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a
A Preference Semantics for Ground Nonmonotonic Modal Logics Daniele Nardi and Riccardo Rosati Dipartimento di Informatica e Sistemistica, Universita di Roma \La Sapienza", Via Salaria 113, I-00198 Roma,
More informationThen RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since
A Note on Independent Random Oracles Jack H. Lutz Department of Computer Science Iowa State University Ames, IA 50011 Abstract It is shown that P(A) \ P(B) = BPP holds for every A B. algorithmically random
More informationInclusion Problems in Parallel Learning and Games
journal of computer and system sciences 52, 403420 (1996) article no. 0031 Inclusion Problems in Parallel Learning and Games Martin Kummer* and Frank Stephan - Institut fu r Logik, Komplexita t, und Deduktionssysteme,
More informationQuery complexity of membership comparable sets
Theoretical Computer Science 302 (2003) 467 474 www.elsevier.com/locate/tcs Note Query complexity of membership comparable sets Till Tantau 1 Fakultat IV - Elektrotechnik und Informatik, Technische Universitat
More information2 THE COMPUTABLY ENUMERABLE SUPERSETS OF AN R-MAXIMAL SET The structure of E has been the subject of much investigation over the past fty- ve years, s
ON THE FILTER OF COMPUTABLY ENUMERABLE SUPERSETS OF AN R-MAXIMAL SET Steffen Lempp Andre Nies D. Reed Solomon Department of Mathematics University of Wisconsin Madison, WI 53706-1388 USA Department of
More information2 M. M. Arslanov, S. Lempp, R. A. Shore Theorem 1.1. (Cooper [1971]) There is a properly d-r.e. degree, i.e. a Turing degree containing a d-r.e. but n
On isolating r.e. and isolated d-r.e. degrees Marat Arslanov Kazan University, Kazan, Russia Steen Lempp y University of Wisconsin, Madison WI 53706-1388 USA Richard A. Shore x Cornell University, Ithaca
More informationDecision Problems Concerning. Prime Words and Languages of the
Decision Problems Concerning Prime Words and Languages of the PCP Marjo Lipponen Turku Centre for Computer Science TUCS Technical Report No 27 June 1996 ISBN 951-650-783-2 ISSN 1239-1891 Abstract This
More information2 THE COMPLEXITY OF TORSION-FREENESS On the other hand, the nite presentation of a group G also does not allow us to determine almost any conceivable
THE COMPUTATIONAL COMPLEXITY OF TORSION-FREENESS OF FINITELY PRESENTED GROUPS Steffen Lempp Department of Mathematics University of Wisconsin Madison, WI 53706{1388, USA Abstract. We determine the complexity
More informationNote An example of a computable absolutely normal number
Theoretical Computer Science 270 (2002) 947 958 www.elsevier.com/locate/tcs Note An example of a computable absolutely normal number Veronica Becher ; 1, Santiago Figueira Departamento de Computation,
More informationRandom Reals à la Chaitin with or without prefix-freeness
Random Reals à la Chaitin with or without prefix-freeness Verónica Becher Departamento de Computación, FCEyN Universidad de Buenos Aires - CONICET Argentina vbecher@dc.uba.ar Serge Grigorieff LIAFA, Université
More informationCircuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department
Circuit depth relative to a random oracle Peter Bro Miltersen Aarhus University, Computer Science Department Ny Munkegade, DK 8000 Aarhus C, Denmark. pbmiltersen@daimi.aau.dk Keywords: Computational complexity,
More informationHomological Decision Problems for Finitely Generated Groups with Solvable Word Problem
Homological Decision Problems for Finitely Generated Groups with Solvable Word Problem W.A. Bogley Oregon State University J. Harlander Johann Wolfgang Goethe-Universität 24 May, 2000 Abstract We show
More informationof Learning Teams Kalvis Apstis Department of Computer Science University of Maryland College Park, MD 20742, USA Rusins Freivalds
On Duality in Learning and the Selection of Learning Teams Kalvis Apstis Department of Computer Science University of Maryland College Park, MD 20742, USA kalvis@csumdedu Rusins Freivalds Institute of
More informationJónsson posets and unary Jónsson algebras
Jónsson posets and unary Jónsson algebras Keith A. Kearnes and Greg Oman Abstract. We show that if P is an infinite poset whose proper order ideals have cardinality strictly less than P, and κ is a cardinal
More informationThe Inclusion Exclusion Principle and Its More General Version
The Inclusion Exclusion Principle and Its More General Version Stewart Weiss June 28, 2009 1 Introduction The Inclusion-Exclusion Principle is typically seen in the context of combinatorics or probability
More informationOn an algebra related to orbit-counting. Peter J. Cameron. Queen Mary and Westeld College. London E1 4NS U.K. Abstract
On an algebra related to orbit-counting Peter J. Cameron School of Mathematical Sciences Queen Mary and Westeld College London E1 4NS U.K. Abstract With any permutation group G on an innite set is associated
More informationRecognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing. Toshio Suzuki
Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing Toshio Suzui Osaa Prefecture University Saai, Osaa 599-8531, Japan suzui@mi.cias.osaafu-u.ac.jp
More informationChaitin Ω Numbers and Halting Problems
Chaitin Ω Numbers and Halting Problems Kohtaro Tadaki Research and Development Initiative, Chuo University CREST, JST 1 13 27 Kasuga, Bunkyo-ku, Tokyo 112-8551, Japan E-mail: tadaki@kc.chuo-u.ac.jp Abstract.
More informationThe length-ω 1 open game quantifier propagates scales
The length-ω 1 open game quantifier propagates scales John R. Steel June 5, 2006 0 Introduction We shall call a set T an ω 1 -tree if only if T α
More informationSTOCHASTIC DIFFERENTIAL EQUATIONS WITH EXTRA PROPERTIES H. JEROME KEISLER. Department of Mathematics. University of Wisconsin.
STOCHASTIC DIFFERENTIAL EQUATIONS WITH EXTRA PROPERTIES H. JEROME KEISLER Department of Mathematics University of Wisconsin Madison WI 5376 keisler@math.wisc.edu 1. Introduction The Loeb measure construction
More informationCoins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to
Coins with arbitrary weights Noga Alon Dmitry N. Kozlov y Abstract Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to decide if all the m given coins have the
More informationElementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),
Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes
More informationDefinability in the Enumeration Degrees
Definability in the Enumeration Degrees Theodore A. Slaman W. Hugh Woodin Abstract We prove that every countable relation on the enumeration degrees, E, is uniformly definable from parameters in E. Consequently,
More informationComputing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus,
Computing the acceptability semantics Francesca Toni 1 and Antonios C. Kakas 2 1 Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK, ft@doc.ic.ac.uk 2 Department of Computer
More informationTuples of Disjoint NP-Sets
Tuples of Disjoint NP-Sets (Extended Abstract) Olaf Beyersdorff Institut für Informatik, Humboldt-Universität zu Berlin, 10099 Berlin, Germany beyersdo@informatik.hu-berlin.de Abstract. Disjoint NP-pairs
More informationEMBEDDING DISTRIBUTIVE LATTICES IN THE Σ 0 2 ENUMERATION DEGREES
EMBEDDING DISTRIBUTIVE LATTICES IN THE Σ 0 2 ENUMERATION DEGREES HRISTO GANCHEV AND MARIYA SOSKOVA 1. Introduction The local structure of the enumeration degrees G e is the partially ordered set of the
More information460 HOLGER DETTE AND WILLIAM J STUDDEN order to examine how a given design behaves in the model g` with respect to the D-optimality criterion one uses
Statistica Sinica 5(1995), 459-473 OPTIMAL DESIGNS FOR POLYNOMIAL REGRESSION WHEN THE DEGREE IS NOT KNOWN Holger Dette and William J Studden Technische Universitat Dresden and Purdue University Abstract:
More informationA. For which A, n can we get by with fewer queries? Other questions involving how many queries do you need to... have been posed and (some) answered.
GEMS IN THE FIELD OF BOUNDED QUERIES William Gasarch Department of Computer Science University of Maryland at College Park MD 20742, USA gasarch@cs.umd.edu Abstract Let A be a set. Given {x 1,..., x n},
More informationarxiv: v1 [cs.lo] 16 Jul 2017
SOME IMPROVEMENTS IN FUZZY TURING MACHINES HADI FARAHANI arxiv:1707.05311v1 [cs.lo] 16 Jul 2017 Department of Computer Science, Shahid Beheshti University, G.C, Tehran, Iran h farahani@sbu.ac.ir Abstract.
More information3.1 Basic properties of real numbers - continuation Inmum and supremum of a set of real numbers
Chapter 3 Real numbers The notion of real number was introduced in section 1.3 where the axiomatic denition of the set of all real numbers was done and some basic properties of the set of all real numbers
More informationSUBSPACES OF COMPUTABLE VECTOR SPACES
SUBSPACES OF COMPUTABLE VECTOR SPACES RODNEY G. DOWNEY, DENIS R. HIRSCHFELDT, ASHER M. KACH, STEFFEN LEMPP, JOSEPH R. MILETI, AND ANTONIO MONTALBÁN Abstract. We show that the existence of a nontrivial
More informationThe complexity of recursive constraint satisfaction problems.
The complexity of recursive constraint satisfaction problems. Victor W. Marek Department of Computer Science University of Kentucky Lexington, KY 40506, USA marek@cs.uky.edu Jeffrey B. Remmel Department
More informationVector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)
Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational
More informationLimitations of Efficient Reducibility to the Kolmogorov Random Strings
Limitations of Efficient Reducibility to the Kolmogorov Random Strings John M. HITCHCOCK 1 Department of Computer Science, University of Wyoming Abstract. We show the following results for polynomial-time
More informationA DECOMPOSITION THEOREM FOR FRAMES AND THE FEICHTINGER CONJECTURE
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000 000 S 0002-9939(XX)0000-0 A DECOMPOSITION THEOREM FOR FRAMES AND THE FEICHTINGER CONJECTURE PETER G. CASAZZA, GITTA KUTYNIOK,
More informationRAMSEY S THEOREM AND CONE AVOIDANCE
RAMSEY S THEOREM AND CONE AVOIDANCE DAMIR D. DZHAFAROV AND CARL G. JOCKUSCH, JR. Abstract. It was shown by Cholak, Jockusch, and Slaman that every computable 2-coloring of pairs admits an infinite low
More informationform, but that fails as soon as one has an object greater than every natural number. Induction in the < form frequently goes under the fancy name \tra
Transnite Ordinals and Their Notations: For The Uninitiated Version 1.1 Hilbert Levitz Department of Computer Science Florida State University levitz@cs.fsu.edu Intoduction This is supposed to be a primer
More informationContents 1 Introduction A historical note : : : : : : : : : : : : : : : : : : : : : : : : : Modal logic : : : : : : : : : : : : : : : : :
On Axiomatizations for Propositional Logics of Programs P.M.W. Knijnenburg RUU-CS-88-34 November 1988 Contents 1 Introduction 3 1.1 A historical note : : : : : : : : : : : : : : : : : : : : : : : : : 3
More informationOn Languages with Very High Information Content
Computer Science Technical Reports Computer Science 5-1992 On Languages with Very High Information Content Ronald V. Book University of California, Santa Barbara Jack H. Lutz Iowa State University, lutz@iastate.edu
More informationFinding Succinct. Ordered Minimal Perfect. Hash Functions. Steven S. Seiden 3 Daniel S. Hirschberg 3. September 22, Abstract
Finding Succinct Ordered Minimal Perfect Hash Functions Steven S. Seiden 3 Daniel S. Hirschberg 3 September 22, 1994 Abstract An ordered minimal perfect hash table is one in which no collisions occur among
More informationSelected Topics in the Theory of the Computably Enumerable Sets and Degrees
Selected Topics in the Theory of the Computably Enumerable Sets and Degrees Klaus Ambos-Spies Ruprecht-Karls-Universität Heidelberg Institut für Informatik Handout 3-8 November 2017 4 Effective reducibilities
More informationFinite and Infinite Sets
Chapter 9 Finite and Infinite Sets 9. Finite Sets Preview Activity (Equivalent Sets, Part ). Let A and B be sets and let f be a function from A to B..f W A! B/. Carefully complete each of the following
More information2 C. A. Gunter ackground asic Domain Theory. A poset is a set D together with a binary relation v which is reexive, transitive and anti-symmetric. A s
1 THE LARGEST FIRST-ORDER-AXIOMATIZALE CARTESIAN CLOSED CATEGORY OF DOMAINS 1 June 1986 Carl A. Gunter Cambridge University Computer Laboratory, Cambridge C2 3QG, England Introduction The inspiration for
More informationSpurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics
UNIVERSITY OF CAMBRIDGE Numerical Analysis Reports Spurious Chaotic Solutions of Dierential Equations Sigitas Keras DAMTP 994/NA6 September 994 Department of Applied Mathematics and Theoretical Physics
More informationOn the classication of algebras
Technische Universität Carolo-Wilhelmina Braunschweig Institut Computational Mathematics On the classication of algebras Morten Wesche September 19, 2016 Introduction Higman (1950) published the papers
More informationDecidability of Existence and Construction of a Complement of a given function
Decidability of Existence and Construction of a Complement of a given function Ka.Shrinivaasan, Chennai Mathematical Institute (CMI) (shrinivas@cmi.ac.in) April 28, 2011 Abstract This article denes a complement
More informationLearning via Finitely Many Queries
Learning via Finitely Many Queries Andrew C. Lee University of Louisiana at Lafayette 1 Abstract This work introduces a new query inference model that can access data and communicate with a teacher by
More informationReverse mathematics and marriage problems with unique solutions
Reverse mathematics and marriage problems with unique solutions Jeffry L. Hirst and Noah A. Hughes January 28, 2014 Abstract We analyze the logical strength of theorems on marriage problems with unique
More informationIndependence of Boolean algebras and forcing
Annals of Pure and Applied Logic 124 (2003) 179 191 www.elsevier.com/locate/apal Independence of Boolean algebras and forcing Milos S. Kurilic Department of Mathematics and Informatics, University of Novi
More informationJack H. Lutz. Iowa State University. Abstract. It is shown that almost every language in ESPACE is very hard to
An Upward Measure Separation Theorem Jack H. Lutz Department of Computer Science Iowa State University Ames, IA 50011 Abstract It is shown that almost every language in ESPACE is very hard to approximate
More informationSTRUCTURES WITH MINIMAL TURING DEGREES AND GAMES, A RESEARCH PROPOSAL
STRUCTURES WITH MINIMAL TURING DEGREES AND GAMES, A RESEARCH PROPOSAL ZHENHAO LI 1. Structures whose degree spectrum contain minimal elements/turing degrees 1.1. Background. Richter showed in [Ric81] that
More informationSOME MEASURABILITY AND CONTINUITY PROPERTIES OF ARBITRARY REAL FUNCTIONS
LE MATEMATICHE Vol. LVII (2002) Fasc. I, pp. 6382 SOME MEASURABILITY AND CONTINUITY PROPERTIES OF ARBITRARY REAL FUNCTIONS VITTORINO PATA - ALFONSO VILLANI Given an arbitrary real function f, the set D
More informationPortland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which
Beyond P NP = NEXP Stephen A. Fenner 1? and Lance J. Fortnow 2?? 1 University of Southern Maine, Department of Computer Science 96 Falmouth St., Portland, ME 04103, USA E-mail: fenner@usm.maine.edu, Fax:
More informationON A CLASS OF APERIODIC SUM-FREE SETS NEIL J. CALKIN PAUL ERD OS. that is that there are innitely many n not in S which are not a sum of two elements
ON A CLASS OF APERIODIC SUM-FREE SETS NEIL J. CALKIN PAUL ERD OS Abstract. We show that certain natural aperiodic sum-free sets are incomplete, that is that there are innitely many n not in S which are
More informationPreface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques
Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists
More informationYale University Department of Computer Science. The VC Dimension of k-fold Union
Yale University Department of Computer Science The VC Dimension of k-fold Union David Eisenstat Dana Angluin YALEU/DCS/TR-1360 June 2006, revised October 2006 The VC Dimension of k-fold Union David Eisenstat
More informationOn the Complexity of Budgeted Maximum Path Coverage on Trees
On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of
More informationgrowth rates of perturbed time-varying linear systems, [14]. For this setup it is also necessary to study discrete-time systems with a transition map
Remarks on universal nonsingular controls for discrete-time systems Eduardo D. Sontag a and Fabian R. Wirth b;1 a Department of Mathematics, Rutgers University, New Brunswick, NJ 08903, b sontag@hilbert.rutgers.edu
More informationA.J. Kfoury y. December 20, Abstract. Various restrictions on the terms allowed for substitution give rise
A General Theory of Semi-Unication Said Jahama Boston University (jahama@cs.bu.edu) A.J. Kfoury y Boston University (kfoury@cs.bu.edu) December 20, 1993 Technical Report: bu-cs # 93-018 Abstract Various
More informationEvery set has a least jump enumeration
Every set has a least jump enumeration Richard J. Coles, Rod G. Downey and Theodore A. Slaman Abstract Given a computably enumerable set B, there is a Turing degree which is the least jump of any set in
More informationTHE STRENGTH OF SOME COMBINATORIAL PRINCIPLES RELATED TO RAMSEY S THEOREM FOR PAIRS
THE STRENGTH OF SOME COMBINATORIAL PRINCIPLES RELATED TO RAMSEY S THEOREM FOR PAIRS DENIS R. HIRSCHFELDT, CARL G. JOCKUSCH, JR., BJØRN KJOS-HANSSEN, STEFFEN LEMPP, AND THEODORE A. SLAMAN Abstract. We study
More informationA Techniques-Oriented Survey of Bounded Queries
A Techniques-Oriented Survey of Bounded Queries William Gasarch University of Maryland 1 Introduction One paradigm in computational complexity theory is the classification of recursive functions according
More information290 J.M. Carnicer, J.M. Pe~na basis (u 1 ; : : : ; u n ) consisting of minimally supported elements, yet also has a basis (v 1 ; : : : ; v n ) which f
Numer. Math. 67: 289{301 (1994) Numerische Mathematik c Springer-Verlag 1994 Electronic Edition Least supported bases and local linear independence J.M. Carnicer, J.M. Pe~na? Departamento de Matematica
More information2 RODNEY G. DOWNEY STEFFEN LEMPP Theorem. For any incomplete r.e. degree w, there is an incomplete r.e. degree a > w such that there is no r.e. degree
THERE IS NO PLUS-CAPPING DEGREE Rodney G. Downey Steffen Lempp Department of Mathematics, Victoria University of Wellington, Wellington, New Zealand downey@math.vuw.ac.nz Department of Mathematics, University
More informationPAC LEARNING, VC DIMENSION, AND THE ARITHMETIC HIERARCHY
PAC LEARNING, VC DIMENSION, AND THE ARITHMETIC HIERARCHY WESLEY CALVERT Abstract. We compute that the index set of PAC-learnable concept classes is m-complete Σ 0 3 within the set of indices for all concept
More informationwhich possibility holds in an ensemble with a given a priori probability p k log 2
ALGORITHMIC INFORMATION THEORY Encyclopedia of Statistical Sciences, Volume 1, Wiley, New York, 1982, pp. 38{41 The Shannon entropy* concept of classical information theory* [9] is an ensemble notion it
More informationFinding paths through narrow and wide trees
Finding paths through narrow and wide trees Stephen Binns Department of Mathematics and Statistics King Fahd University of Petroleum and Minerals Dhahran 31261 Saudi Arabia Bjørn Kjos-Hanssen Department
More informationAn uncountably categorical theory whose only computably presentable model is saturated
An uncountably categorical theory whose only computably presentable model is saturated Denis R. Hirschfeldt Department of Mathematics University of Chicago, USA Bakhadyr Khoussainov Department of Computer
More information258 Handbook of Discrete and Combinatorial Mathematics
258 Handbook of Discrete and Combinatorial Mathematics 16.3 COMPUTABILITY Most of the material presented here is presented in far more detail in the texts of Rogers [R], Odifreddi [O], and Soare [S]. In
More informationA Super Introduction to Reverse Mathematics
A Super Introduction to Reverse Mathematics K. Gao December 12, 2015 Outline Background Second Order Arithmetic RCA 0 and Mathematics in RCA 0 Other Important Subsystems Reverse Mathematics and Other Branches
More informationCORES OF ALEXANDROFF SPACES
CORES OF ALEXANDROFF SPACES XI CHEN Abstract. Following Kukie la, we show how to generalize some results from May s book [4] concerning cores of finite spaces to cores of Alexandroff spaces. It turns out
More informationInvariance Properties of Random Sequences Peter Hertling and Yongge Wang Department of Comper Science, The University of Auckland Private Bag 92019, A
CDMTCS Research Report Series Invariance properties of random sequences Peter Hertling and Yongee Wang Department of Comper Science University of Auckland CDMTCS-061 October 1997 Centre for Discrete Mathematics
More informationThis second-order avor of default logic makes it especially useful in knowledge representation. An important question is, then, to characterize those
Representation Theory for Default Logic V. Wiktor Marek 1 Jan Treur 2 and Miros law Truszczynski 3 Keywords: default logic, extensions, normal default logic, representability Abstract Default logic can
More informationSparse Sets, Approximable Sets, and Parallel Queries to NP. Abstract
Sparse Sets, Approximable Sets, and Parallel Queries to NP V. Arvind Institute of Mathematical Sciences C. I. T. Campus Chennai 600 113, India Jacobo Toran Abteilung Theoretische Informatik, Universitat
More informationPETER A. CHOLAK, PETER GERDES, AND KAREN LANGE
D-MAXIMAL SETS PETER A. CHOLAK, PETER GERDES, AND KAREN LANGE Abstract. Soare [23] proved that the maximal sets form an orbit in E. We consider here D-maximal sets, generalizations of maximal sets introduced
More informationKlaus Madlener. Internet: Friedrich Otto. Fachbereich Mathematik/Informatik, Universitat Kassel.
Some Undecidability Results For Finitely Generated Thue Congruences On A Two-Letter Alphabet Klaus Madlener Fachbereich Informatik, Universitat Kaiserslautern D{67653 Kaiserslautern Internet: madlener@informatik.uni-kl.de
More informationEmbedding and Coding Below a 1-Generic Degree
Notre Dame Journal of Formal Logic Embedding and Coding Below a 1-Generic Degree Noam Greenberg and Antonio Montalbán Abstract We show that the theory of D( g), where g is a 2-generic or a 1-generic degree
More informationk-fold unions of low-dimensional concept classes
k-fold unions of low-dimensional concept classes David Eisenstat September 2009 Abstract We show that 2 is the minimum VC dimension of a concept class whose k-fold union has VC dimension Ω(k log k). Keywords:
More informationFor the property of having nite derivation type this result has been strengthened considerably by Otto and Sattler-Klein by showing that this property
FP is undecidable for nitely presented monoids with word problems decidable in polynomial time Robert Cremanns and Friedrich Otto Fachbereich Mathematik/Informatik Universitat Kassel, 349 Kassel, Germany
More informationOn approximate decidability of minimal programs 1
On approximate decidability of minimal programs 1 Jason Teutsch June 12, 2014 1 Joint work with Marius Zimand How not to estimate complexity What s hard about Kolmogorov complexity? the case of functions
More informationExtracted from a working draft of Goldreich s FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice.
106 CHAPTER 3. PSEUDORANDOM GENERATORS Using the ideas presented in the proofs of Propositions 3.5.3 and 3.5.9, one can show that if the n 3 -bit to l(n 3 ) + 1-bit function used in Construction 3.5.2
More informationFREE PRODUCTS AND BRITTON S LEMMA
FREE PRODUCTS AND BRITTON S LEMMA Dan Lidral-Porter 1. Free Products I determined that the best jumping off point was to start with free products. Free products are an extension of the notion of free groups.
More informationHECHLER'S THEOREM FOR TALL ANALYTIC P-IDEALS
HECHLER'S THEOREM FOR TALL ANALYTIC P-IDEALS BARNABÁS FARKAS Abstract. We prove the following version of Hechler's classical theorem: For each partially ordered set (Q, ) with the property that every countable
More informationLöwenheim-Skolem Theorems, Countable Approximations, and L ω. David W. Kueker (Lecture Notes, Fall 2007)
Löwenheim-Skolem Theorems, Countable Approximations, and L ω 0. Introduction David W. Kueker (Lecture Notes, Fall 2007) In its simplest form the Löwenheim-Skolem Theorem for L ω1 ω states that if σ L ω1
More informationA Necessary Condition for Learning from Positive Examples
Machine Learning, 5, 101-113 (1990) 1990 Kluwer Academic Publishers. Manufactured in The Netherlands. A Necessary Condition for Learning from Positive Examples HAIM SHVAYTSER* (HAIM%SARNOFF@PRINCETON.EDU)
More informationQuantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en
Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for enlargements with an arbitrary state space. We show in
More informationOn the Intrinsic Complexity of Learning Recursive Functions
On the Intrinsic Complexity of Learning Recursive Functions Sanjay Jain and Efim Kinber and Christophe Papazian and Carl Smith and Rolf Wiehagen School of Computing, National University of Singapore, Singapore
More informationinterval order and all height one orders. Our major contributions are a characterization of tree-visibility orders by an innite family of minimal forb
Tree-Visibility Orders Dieter Kratsch y Jean-Xavier Rampon z Abstract We introduce a new class of partially ordered sets, called tree-visibility orders, containing interval orders, duals of generalized
More informationExtension of continuous functions in digital spaces with the Khalimsky topology
Extension of continuous functions in digital spaces with the Khalimsky topology Erik Melin Uppsala University, Department of Mathematics Box 480, SE-751 06 Uppsala, Sweden melin@math.uu.se http://www.math.uu.se/~melin
More informationOn the P versus NP intersected with co-np question in communication complexity
On the P versus NP intersected with co-np question in communication complexity Stasys Jukna Abstract We consider the analog of the P versus NP co-np question for the classical two-party communication protocols
More informationProbabilistic Learning of Indexed Families under Monotonicity Constraints
Probabilistic Learning of Indexed Families under Monotonicity Constraints Hierarchy Results and Complexity Aspects vorgelegt von Diplom Mathematikerin Lea Meyer aus Kehl Dissertation zur Erlangung des
More informationThe Complexity of Learning Concept Classes with Polynomial General Dimension
The Complexity of Learning Concept Classes with Polynomial General Dimension Johannes Köbler a, Wolfgang Lindner b a Institut für Informatik, Humboldt-Universität zu Berlin, 10099 Berlin, Germany b Abteilung
More information