UNIVERSAL COMPUTABLY ENUMERABLE EQUIVALENCE RELATIONS

Similar documents
UNIVERSAL COMPUTABLY ENUMERABLE EQUIVALENCE RELATIONS

1 Introduction. Σ 0 1 and Π 0 1 equivalence structures

A DECOMPOSITION OF THE ROGERS SEMILATTICE OF A FAMILY OF D.C.E. SETS

STABILITY AND POSETS

PETER A. CHOLAK, PETER GERDES, AND KAREN LANGE

Learnability and Numberings of Families of Computably Enumerable Sets

PETER A. CHOLAK, PETER GERDES, AND KAREN LANGE

THE STRENGTH OF SOME COMBINATORIAL PRINCIPLES RELATED TO RAMSEY S THEOREM FOR PAIRS

Kiddie Talk - The Diamond Lemma and its applications

Every Incomplete Computably Enumerable Truth-Table Degree Is Branching

Monotonically Computable Real Numbers

Reverse mathematics and the equivalence of definitions for well and better quasi-orders

Jónsson posets and unary Jónsson algebras

SPECTRA OF ATOMIC THEORIES

2 THE COMPUTABLY ENUMERABLE SUPERSETS OF AN R-MAXIMAL SET The structure of E has been the subject of much investigation over the past fty- ve years, s

VC-DENSITY FOR TREES

Computability Theoretic Properties of Injection Structures

Exercise Solutions to Functional Analysis

CUPPABLE DEGREES AND THE HIGH/LOW HIERARCHY

Definability in the Enumeration Degrees

Tree sets. Reinhard Diestel

Isomorphisms between pattern classes

RAMSEY S THEOREM AND CONE AVOIDANCE

The Canonical Ramsey Theorem and Computability Theory

Lecture 6: Finite Fields

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

Computably Enumerable Algebras, Their Expansions, and Isomorphisms

Every set has a least jump enumeration

5 Set Operations, Functions, and Counting

Selected Topics in the Theory of the Computably Enumerable Sets and Degrees

AN EXTENSION OF A THEOREM OF EULER. 1. Introduction

СИБИРСКИЕ ЭЛЕКТРОННЫЕ МАТЕМАТИЧЕСКИЕ ИЗВЕСТИЯ Siberian Electronic Mathematical Reports

RANDOMNESS AND NON-ERGODIC SYSTEMS

2 RODNEY G. DOWNEY STEFFEN LEMPP Theorem. For any incomplete r.e. degree w, there is an incomplete r.e. degree a > w such that there is no r.e. degree

2. Prime and Maximal Ideals

Measures and Measure Spaces

INVERSE LIMITS AND PROFINITE GROUPS

On the Effectiveness of Symmetry Breaking

CHAPTER 3. Number Theory

Part II. Logic and Set Theory. Year

RINGS ISOMORPHIC TO THEIR NONTRIVIAL SUBRINGS

Mathematics Course 111: Algebra I Part I: Algebraic Structures, Sets and Permutations

The high/low hierarchy in the local structure of the ω-enumeration degrees

INDEX SETS OF UNIVERSAL CODES

THE NEXT BEST THING TO A P-POINT

Notes on the Dual Ramsey Theorem

ON THE ROLE OF THE COLLECTION PRINCIPLE FOR Σ 0 2-FORMULAS IN SECOND-ORDER REVERSE MATHEMATICS

MATH 326: RINGS AND MODULES STEFAN GILLE

1 Basic Combinatorics

ATOMLESS r-maximal SETS

Finite Fields: An introduction through exercises Jonathan Buss Spring 2014

GENERALIZED CANTOR SETS AND SETS OF SUMS OF CONVERGENT ALTERNATING SERIES

ALGEBRA. 1. Some elementary number theory 1.1. Primes and divisibility. We denote the collection of integers

2 M. M. Arslanov, S. Lempp, R. A. Shore Theorem 1.1. (Cooper [1971]) There is a properly d-r.e. degree, i.e. a Turing degree containing a d-r.e. but n

0 Sets and Induction. Sets

COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF

Splitting Theorems and the Jump Operator

BP -HOMOLOGY AND AN IMPLICATION FOR SYMMETRIC POLYNOMIALS. 1. Introduction and results

Computable Transformations of Structures

Generalized Pigeonhole Properties of Graphs and Oriented Graphs

Metainduction in Operational Set Theory

Infinite constructions in set theory

Boolean Algebras, Boolean Rings and Stone s Representation Theorem

An uncountably categorical theory whose only computably presentable model is saturated

GEOMETRIC CONSTRUCTIONS AND ALGEBRAIC FIELD EXTENSIONS

Muchnik Degrees: Results and Techniques

EQUIVALENCE RELATIONS AND THE HALTING PROBLEM

THE RADO PATH DECOMPOSITION THEOREM

Recursive definitions on surreal numbers

Zaslavsky s Theorem. As presented by Eric Samansky May 11, 2002

Static-Priority Scheduling. CSCE 990: Real-Time Systems. Steve Goddard. Static-priority Scheduling

23.1 Gödel Numberings and Diagonalization

ANNIHILATOR IDEALS IN ALMOST SEMILATTICE

8. Limit Laws. lim(f g)(x) = lim f(x) lim g(x), (x) = lim x a f(x) g lim x a g(x)

Topology. Xiaolong Han. Department of Mathematics, California State University, Northridge, CA 91330, USA address:

How many units can a commutative ring have?

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 27

Computable structures and operations on the space of continuous functions

Automorphism groups of wreath product digraphs

6 CARDINALITY OF SETS

Posets, homomorphisms and homogeneity

Measurable functions are approximately nice, even if look terrible.

Chapter 2: Linear Independence and Bases

ON THE COMPUTABILITY OF PERFECT SUBSETS OF SETS WITH POSITIVE MEASURE

Research Article On Maslanka s Representation for the Riemann Zeta Function

Topology Proceedings. COPYRIGHT c by Topology Proceedings. All rights reserved.

Notes on ordinals and cardinals

Closure operators on sets and algebraic lattices

(i) By Corollary 1.3 (a) on P. 88, we know that the predicate. Q(x, y, z) S 1 (x, (z) 1, y, (z) 2 )

10. Smooth Varieties. 82 Andreas Gathmann

Mathematics 114L Spring 2018 D.A. Martin. Mathematical Logic

SIMULTANEOUS REDUCIBILITY OF PAIRS OF BOREL EQUIVALENCE RELATIONS

Order-Computable Sets

32 Divisibility Theory in Integral Domains

Extension of continuous functions in digital spaces with the Khalimsky topology

The Symmetric Groups

Nilpotency and the number of word maps of a finite group

Polynomial functions on subsets of non-commutative rings a link between ringsets and null-ideal sets

Finite pseudocomplemented lattices: The spectra and the Glivenko congruence

Transcription:

UNIVERSAL COMPUTABLY ENUMERABLE EQUIVALENCE RELATIONS URI ANDREWS, STEFFEN LEMPP, JOSEPH S. MILLER, KENG MENG NG, LUCA SAN MAURO, AND ANDREA SORBI Abstract. We study computably enumerable equivalence relations (ceers), under the reducibility R S if there exists a computable function f such that x R y if and only if f(x) S f(y), for every x, y. We show that the degrees of ceers under the equivalence relation generated by form a bounded poset that is neither a lower semilattice, nor an upper semilattice, and its first order theory is undecidable. We then study the universal ceers. We show that 1) the uniformly effectively inseparable ceers are universal, but there are effectively inseparable ceers that are not universal; 2) a ceer R is universal if and only if R R, where R denotes the halting ump operator introduced by Gao and Gerdes (answering an open question of Gao and Gerdes); and 3) both the index set of the universal ceers and the index set of the uniformly effectively inseparable ceers are Σ 0 3-complete (the former answering an open question of Gao and Gerdes). 1. Introduction Given equivalence relations R and S over the set ω of the natural numbers, define R reducible to S (notation: R S) if there exists a computable function f such that x R y f(x) S f(y), for all x, y. This reducibility can be viewed as a natural computable version of Borel reducibility (in which the reduction function is Borel), widely studied in descriptive set theory to measure the relative complexity of Borel equivalence relations on Polish spaces, see for instance the textboos [1, 19]. The reducibility was introduced by Ershov (see Ershov s monograph [13], translated into German in [10, 11, 12]), while dealing with the monomorphisms of a certain category. Following Ershov, one can introduce the category of equivalence relations on ω, in which a morphism from R to S is a function µ : ω/ R ω/ S between the corresponding quotient sets, such that there is a computable function f with µ([x]/ R ) = [f(x)]/ S, or in other words, x R y f(x) S f(y). 2010 Mathematics Subect Classification. 03D25. Key words and phrases. Computably enumerable equivalence relations, effectively inseparable sets. Lempp s research was partially supported by an AMS-Simons Foundation Collaboration Grant 209087. Miller s research was partially supported by NSF grant DMS-1001847. Sorbi s research was partially carried out while he was visiting the Department of Mathematics of the University of Wisconsin-Madison in March 2011. The second and last author would lie to than the Isaac Newton Institute for Mathematical Sciences of Cambridge, England, for its hospitality during the final phase this paper was completed. 1

2 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI (In fact, Ershov s primary interest is in the category of numberings, of fundamental interest in the foundations of computability theory, computable algebra, and computable model theory. One can view the category of equivalence relations as a full subcategory of the category of numberings, such that every obect in the category of numberings is isomorphic to an obect in the subcategory of equivalence relations.) It is then easy to see that R S if and only if, in the terminology of category theory, there is a monomorphism from R to S, i.e., R is a subobect of S. In recent years, there has been a sudden burst of interest in the reducibility, either to compare it and contrast it with Borel reducibility (see for instance [8, 18, 15]), or to study the complexity of various equivalence relations, such as the isomorphism relation, on classes of computable structures (see for instance [14, 16, 17]). We study computably enumerable equivalence relations (for short, ceers) under. Ceers appear frequently in mathematics (for instance as equality of words in finitely presented semigroups or groups), in computable model theory (see e.g., [6], where ceers are called Σ 0 1 equivalence structures), and in the theory of numberings, where the ceers are exactly the equivalence relations corresponding to the so called positive numberings (in fact, in the Russian literature, ceers are often called positive equivalence relations, as in [9]). Applications of the reducibility to ceers have also been motivated by proof theoretic interests in the relation of provable equivalence in formal systems (see for instance [4, 3, 25, 33]), and in universal ceers, i.e., ceers which are complete under with respect to the class of all ceers. An important result along these lines was the discovery that the class of universal ceers contain distinct computable isomorphism types, one of which is constituted by the precomplete ceers, proven by Lachlan [22]. We prove some useful facts about universal ceers and the poset of degrees of ceers under the reducibility. In particular, in Section 2 we show that the poset of degrees of ceers under is neither an upper semilattice nor a lower semilattice (Corollary 2.5), and has undecidable first order theory (Theorem 2.4). We then turn to the study of universal ceers, and in Section 3 we show (Corollary 3.16) that every u.e.i. ceer is universal, where a u.e.i. ceer is a nontrivial ceer (i.e., with more than one equivalence class) providing a partition of ω into sets that are uniformly effectively inseparable; this extends all nown universality results for ceers, and is a natural extension to ceers of classical results stating universality of creative sets, and pairs of effectively inseparable sets. We prove that uniformity is essential to conclude universality, since in Theorem 3.19 we give an example of a ceer that is not universal, but yields a partition into effectively inseparable sets; our proof of universality of u.e.i. ceers succeeds by showing the identity of the class of u.e.i. ceers with certain classes of ceers, obtained by refining classes already nown in the literature. In Section 4 we study the halting ump operation on ceers introduced by Gao and Gerdes [20]: Answering an open question raised in [20], we show (Theorem 4.3) that a ceer is universal if and only if it is bireducible with its halting ump. In the final Section 5, we study some index sets of classes of universal ceers, and answering an open question raised again by Gao and Gerdes [20], we show (Theorem 5.1) that the index set of universal ceers is Σ 0 3 -complete.

UNIVERSAL CEERS 3 1.1. Bacground. Our terminology and notations about computability theory are standard, and can be found for instance in the textboos [29, 32]. A clear and thorough introduction to ceers is provided by [20], which is currently the most complete attempt to give a systematic study of ceers under. For later reference, we show how ceers can be computably numbered, and approximated. We say that a numbering ν of the ceers (i.e., a function ν from ω onto the ceers) is computable if { e, x, y : x ν(e) y} is a c.e. set. One natural way to number all ceers is via the following construction. For every set of numbers X, let X denote the equivalence relation on ω generated by X, where of course we view X as a subset of ω 2, via the Cantor pairing function. It is easy to see that there exists a computable function γ such that, W γ(e) = We, for every e, and if W e is already an equivalence relation on ω, then W γ(e) = W e. Then the numbering of all ceers, ν(e) = W γ(e), is computable. Moreover, it is easy to see that ν is universal, or principal, i.e., for every computable numbering ρ of all ceers, there exists a computable function f such that ρ = ν f. (For different universal computable numberings of all ceers, see e.g., [9, 20].) Throughout the rest of the paper, we denote R e = ν(e). We say that a sequence {R s : s ω} of equivalence relations on ω is a computable approximation to a ceer R, if (1) the set { x, y, s : x R s y} is computable; (2) R 0 = Id; (3) for all s, R s R s+1 ; the equivalence classes of R s are finite; there exists at most one pair [x] R s, [y] R s of equivalence classes, such that [x] R s [y] R s =, but [x] R s+1 = [y] R s+1 (we say in this case that the equivalence relation R-collapses x and y at stage s + 1); (4) R = t Rt. Lemma 1.1. There exists a sequence {Re s : e, s ω} of equivalence relations such that { e, x, y, s : x Re s y} is computable, and the sequence {Re s : s ω} is a computable approximation to R e. Therefore an equivalence relation R is a ceer if and only if R can be computably approximated. Moreover if R is a ceer and R \ { x, x : x ω} is infinite, then one can find an approximating sequence {R s : s ω} to R satisfying that for every s, the relation R s+1 is obtained from R s by the R-collapse of exactly one pair of equivalence classes of R s. Proof. Straightforward. 2. Universal ceers and the poset of degrees of ceers The following definition plays a crucial role in this paper: Definition 2.1. A ceer R is universal if S R, for every ceer S. Clearly, universal ceers do exist: For instance, the ceer R where i, x R, y if i = and x R i y, is clearly universal. The first natural example of a universal ceer was given by Ershov [9, Proposition 8.2]. Subsequently, several classes of universal ceers appeared in the literature, see e.g. [4, 25, 22]; we will propose later, Corollary 3.16, yet a new and wider class of universal ceers.

4 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI Define now R S if R S and S R. Denote by deg(r) the -equivalence class, or degree, of R, and define deg(r) deg(s) R S. Let P = ceers/, denote the poset of degrees of ceers. For every n 1, let Id n denote the ceer x Id n y [x y mod n] (Id 1 is also called the trivial ceer); moreover, let Id be the identity equivalence relation. The following information about P is readily available: (1) P is a bounded poset: The least element is given by deg(id 1 ); the greatest element is given by the degree of universal ceers; (2) P has a linearly ordered initial segment of order type ω + 1, deg(id 1 ) < deg(id 2 ) < < deg(id n ) < < deg(id), with the mapping n deg(id n+1 ) providing the order-theoretic isomorphism of ω with I ω = {deg(id n ) : n 1}. (3) Every ceer with n equivalence classes lies in deg(id n ), whereas deg(id) consists of all decidable ceers with infinitely many equivalence classes. (4) Every R P \ I ω is an upper bound of I ω, i.e., ( S) [S I ω S R]. However, deg(id) is not a lower bound of P \ I ω, as follows from Lemma 2.3 below, for which we first give a preliminary definition: Definition 2.2. Given a set A, define R A by x R A y [x, y A or x = y]. Lemma 2.3. If A is simple, then Id R A. Proof. If Id R A via a computable function f, then f is 1-1, so there is at most one number a such that f(a) A. Then either f[ω \{a}] A c, or f[ω] A c if no such a exists. In either case, A c contains an infinite c.e. set, a contradiction. The main result of this section is Theorem 2.4. The first-order theory of P, in fact its Π 0 3-fragment, is undecidable. Proof. Let 0 1 denote the 1-degree of any computable, infinite and coinfinite set, and let 0 1 denote the 1-degree of K. We first claim that [deg(id), deg(r K)] [0 1, 0 1 ], where denotes order isomorphism between the two intervals of degrees: Notice that Id R A for every computable, infinite and coinfinite set A. The claim follows from the following two observations. First of all, if A, B are c.e. sets with B infinite, then A 1 B R A R B. (This result has been independently noticed by several authors (San Mauro [24]; Cosey, Hamins, and Miller [8]; moreover, the left-to-right implication appears in [20]).

UNIVERSAL CEERS 5 Next, we notice that if Id R R A then there exists a c.e. set B such that R R B. To see this, if Id R R A, and R R A via a computable f, then the range of f is an infinite c.e. set, and thus computably isomorphic to ω; let g : range(f) ω be a computable biection. Finally tae B = g[a range(f)]. Then R B R via h where h(x) = µy. [g(f(y)) = x]. On the other hand, R R B via the computable function g f. Finally, the undecidability of the first order theory follows from Lachlan s result [21] that the topped finite initial segments of [0 1, 0 1 ] are exactly the finite distributive lattices (see also [28, p. 584]); thus the same is true of the interval [deg(id), deg(r K )] of P. Hence the first-order theory of the finite distributive lattices is Σ 1 -elementarily definable with parameters (see [27] for the terminology) in P. On the other hand, the Π 0 3-theory of the finite distributive lattices is hereditarily undecidable ([27, Theorem 4.8]). Hence by the Nies Transfer Lemma, [27], the Π 0 3-theory of P is undecidable. Corollary 2.5. P is neither an upper semilattice nor a lower semilattice. Proof. The claim follows from the isomorphism [deg(id), deg(r K )] [0 1, 0 1 ] and the fact that the poset of c.e. 1-degrees, [0 1, 0 1 ], is neither an upper semilattice nor a lower semilattice, [34]. Additional information about P is provided by the following proposition. For more on P, see also [20]. Proposition 2.6. P is upwards dense and its greatest element is oin-irreducible. Proof. Upwards density will be a corollary to Theorem 4.3. As to the other claim, suppose that R and S are ceers such that their degrees oin to the greatest element. Consider the ceer R S, defined by { u R v if x = 2u and y = 2v, x R S y u S v if x = 2u + 1 and y = 2v + 1. Being above both R and S we have that R S is universal. Let now E be a universal ceer such that there is no decidable set X, ω which is E-closed (i.e., satisfying that x X and y E x imply y X: see again Ershov [9, Proposition 8.2] for an example of such a ceer, or, more generally, this property holds of all the universal ceers given by Corollary 3.16 below), and let f be a computable function reducing E R S. If E R and E S then the set X = {x : f(x) even} is a nontrivial decidable set that is E-closed. 3. Universal ceers and partitions of the natural numbers into effectively inseparable sets Effective inseparability played an important role in the early investigations on universal ceers, see e.g. [4, 25]. We recall:

6 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI Definition 3.1. Two disoint c.e. sets A and B are effectively inseparable if there is a computable function p (called a productive function) such that, for all pairs u, v, [A W u and B W v and W u W v = ] p(u, v) / W u W v. (We notice that the usual definition of an e.i. pair requires the existence of a productive function which is ust partial computable, and defined on all pairs u, v such that A W u, B W v, and W u W v = ; this is, however, equivalent to requiring a total productive function: See e.g., [32, p. 44].) Since every ceer yields a partition of ω into c.e. sets, the previous definition suggests the following definition (where we recall that a ceer R is nontrivial if R Id 1 ): Definition 3.2. A nontrivial ceer R is effectively inseparable (or e.i. for short) if it yields a partition of ω into sets that are pairwise effectively inseparable; uniformly effectively inseparable (or u.e.i. for short) if it is e.i. and there is a uniform productive function, i.e., a computable function p(a, b, u, v) such that if [a] R [b] R = then p(a, b,, ) is a productive function for the pair ( [a] R, [b] R ). Ceers yielding partitions into effectively inseparable sets had been previously studied for instance in [2, 4, 33]. The main result of this section shows that every u.e.i. ceer is universal; on the other hand, there exist e.i. ceers that are not universal. The proof that u.e.i. ceers are universal proceeds by showing that the u.e.i. ceers coincide with two classes of ceers, introduced in the next two definitions, that refine nown classes in the literature. Recall that an equivalence relation R is uniformly finitely precomplete (or u.f.p. for short) if there exists a total computable function f(e, D, x) such that for every finite set D and every e, x, ϕ e (x) [D] R ϕ e (x) R f(e, D, x). This definition is due to Montagna [25], who showed that every u.f.p. ceer is universal. (A proof of this claim also follows from Theorem 3.7 below.) Two important subclasses of u.f.p. ceers (and thus universal ceers) are provided by the precomplete ceers and the extension complete ceers. Precomplete equivalence relations had been introduced much earlier by Malcev [23]. An equivalence relation R is precomplete if there exists a total computable function f(e, x) such that, for all e, x, ϕ e (x) ϕ e (x) R f(e, x). Finally, extension complete (or, simply, e-complete) equivalence relations were introduced by Montagna [25] and by Lachlan [22]: The name is due to Lachlan [22], whereas Montagna called them uniformly finitely m-complete. Following a characterization given by Bernardi and Montagna [3], a ceer R is e-complete if R is u.f.p. and R has a total diagonal function, i.e., a computable function d such that d(x) R x, for all x. The precomplete ceers and the e-complete ceers form two distinct isomorphism types (Lachlan [22] proved that all precomplete ceers

UNIVERSAL CEERS 7 are isomorphic; Montagna [25] proved that all e-complete ceers are isomorphic: see also [22]), where we say that two equivalence relations R and S are isomorphic if there is a computable permutation f of ω such that f reduces R to S. It is, however, worth noting that there are u.f.p ceers that are neither precomplete nor e-complete, Shavruov [30]. Examples of precomplete, u.f.p., and e-complete ceers coming from the relation of provable equivalence in formal systems can be found in [33, 4, 25, 3]. Definition 3.3. We say that a nontrivial ceer R is wealy u.f.p. if there exists a total computable function f(e, D, x) such that for every finite set D, where i R for every i, D, and every e, x, ϕ e (x) [D] R ϕ e (x) R f(e, D, x). Note that the definition differs from that of a u.f.p. ceer in that f need only satisfy the condition when i R for every i, D. Clearly we have Corollary 3.4. Every u.f.p. ceer is wealy u.f.p. Proof. Immediate. The following definition is a strengthening of the definition of a uniformly m-complete ceer given by Bernardi and Sorbi [4]. Namely, a nontrivial ceer R is uniformly m-complete (abbreviated as u.m.c.) if for every ceer S and every assignment a 0 b 0, a 1 b 1 (also denoted by (a 0, a 1 ) (b 0, b 1 )) of numbers such that a 0 S a 1 and b 0 R b 1, there exists a computable function extending the assignment and reducing S to R. Definition 3.5. We say that a nontrivial ceer R is strongly u.m.c. if for every ceer S, every assignment (a 0, a 1 ) (b 0, b 1 ) can be extended uniformly (in a 0, a 1, b 0, b 1 ) to a total computable function f reducing S to R, provided that a 0 S a 1 and b 0 R b 1. (Note that the uniformity extends also to the cases a 0 S a 1 or b 0 R b 1 ; however, then no claim is made as to f reducing S to R.) We call a nontrivial ceer wealy n-u.f.p. if Definition 3.3 for wealy u.f.p. holds, but we replace finite set D with finite set D where D n. Lemma 3.6. Each wealy 2-u.f.p. ceer is wealy u.f.p. Proof. Let f i be a computable function witnessing that R is wealy i-u.f.p., for 2 i n. We describe how to effectively get a function f n+1 witnessing that R is wealy n + 1-u.f.p. Let e, D be given, with D = i. If i > n + 1 or i 1 then f n+1 (e, D, x) outputs 0 for every x; if 2 i n then f n+1 (e, D, x) = f i (e, D, x) for every x. We assume now D = {d 0,..., d n }. By the Double Recursion Theorem (see, e.g., [29, Theorem X(a)]) assume that we build ϕ a and ϕ b for some a, b. Let E x = {f n (a, D \ {d n }, x), d n }, and f n+1 (e, D, x) = f 2 (b, E x, x). We now specify, for an x, how to compute ϕ a (x) and ϕ b (x). We initially start with both values undefined. We see which event happens first: If we find that ϕ e (x) R d n, we define ϕ b (x) = d n. If we find that ϕ e (x) R d i for some i < n, we define ϕ b (x) = f n (a, D \ {d n }, x) and ϕ a (x) = ϕ e (x). Finally, if we discover that f n (a, D \ {d n }, x) R d n, then we define ϕ a (x) = d 0.

8 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI Clearly f n+1 is a total computable function, whose index can be found effectively in the indices for f 2,..., f n, using the fact that the fixed points in the Double Recursion Theorem can be found effectively from the parameters. Now we verify that f n+1 witnesses that R is wealy n + 1-u.f.p. Fix e, D, x such that D = {d 0,..., d n } where d i R d for every pair i, and ϕ e (x) R d i for some i n. First we claim that f n (a, D \ {d n }, x) R d n. Suppose otherwise: Then by construction we would set ϕ a (x) = d 0 unless it has previously been defined (to be ϕ e (x) R d i, for some i < n). In either case we have ϕ a (x) R d i for some i < n, which implies that d n R f n (a, D \ {d n }, x) R d i, a contradiction. We have thus that E x consists of two elements that are not R-equivalent. Since ϕ b (x) is defined only when ϕ e (x) converges, it is straightforward to see that f n+1 (e, D, x) R ϕ e (x). Theorem 3.7. The following properties are equivalent for ceers: (i) u.e.i. (ii) wealy u.f.p. (iii) strongly u.m.c. We prove Theorem 3.7 via Lemmas 3.8, 3.10, and 3.11. Lemma 3.8. Each u.e.i. ceer is wealy u.f.p. Proof. Assume that R is u.e.i. via the uniform productive function p(a, b, u, v) as in Definition 3.2. We argue that R is wealy 2-u.f.p. Given any a b, and e, we uniformly build a function f(x) = f(e, {a, b}, x) witnessing that R is 2-u.f.p. Note that if a = b then we can let f be the constant function with output a. Again by the Double Recursion Theorem with parameters we build W ax, W bx for computable sequences of indices {a x } x ω, {b x } x ω, where the sequence is nown to us during the construction. Let f(x) = p(a x, b x ), where for simplicity we denote p(a, b,, ) by p(, ). Clearly f is a total computable function. Fix x, and let { [a] R, if ϕ e (x) R b W ax = [a] R {p(a x, b x )}, if ϕ e (x) R b, { [b] R, if ϕ e (x) R a W bx = [b] R {p(a x, b x )}, if ϕ e (x) R a. Now assume that a R b, and fix e, x such that ϕ e (x) [a] R [b] R. Without loss of generality suppose ϕ e (x) R a. If f(x) R a then W ax W bx = and p(a x, b x ) W ax W bx, which contradicts p being a productive function. In the proof of Lemma 3.10 below we will use a computable sequence of fixed points. Since a computable sequence of indices can be viewed as the range of a computable function f, a formal ustification to our argument is provided by the Case Functional Recursion Theorem: Lemma 3.9 (Case Functional Recursion Theorem, Case [5]). Given a partial computable functional F, there is a total computable function f such that, for

UNIVERSAL CEERS 9 every e, x, F (f, e, x) = ϕ f(e) (x). Lemma 3.10. Each wealy u.f.p. ceer is strongly u.m.c. Proof. Assume that R is a wealy u.f.p. ceer, as witnessed by the computable function f. In order to show that R is strongly u.m.c., we show in fact that for every ceer S, every assignment (0, 1,..., m) (a 0, a 1,..., a m ) with m > 0, can be extended, uniformly in a 0, a 1,..., a m, to a total computable function inducing a reduction from S to R, provided that i S and a i R a whenever i, with i, m. (Uniformity extends also to the cases in which there are pairs i with i S, or a i R a.) Notice that it is no loss of generality considering an assignment (0, 1,..., m) (a 0, a 1,..., a m ), instead of (a 0, a 1,..., a m) (a 0, a 1,..., a m ): Indeed, given S and (a 0, a 1,..., a m) (a 0, a 1,..., a m ), one can consider the ceer S and the new assignment (0, 1,..., m) (a 0, a 1,..., a m ), where we have piced a computable permutation f of ω with f(i) = a i, for all i m, and we have defined x S y if and only if f(x) S f(y). Clearly, we can extend the new assignment to a reduction of S to R if and only if we can extend the original assignment to a reduction of S to R. The definition of a strongly u.m.c. ceer is thus ust the case m = 1. Our goal (under the assumption that the i s are pairwise not S-equivalent, and the a i s are not R-equivalent, for i m) is to extend this assignment to a total computable function yielding a reduction, by specifying a computable sequence of points (a m+1, a m+2,... ) where for every pair i, such that one of i or is larger than m, we can force a i to R-collapse to a, i.e., to become a i R a. By the Recursion Theorem (or, more precisely, the Case Functional Recursion Theorem), we assume that we control ϕ ei for a computable sequence {e i } i ω of indices. We will define computable arrays {x i, y n} i,,n ω with the purpose that we can choose to cause R-collapses of pairs of y s, from {y n } n ω, independently. We first informally describe the uses of the elements x i and y n. For each, we will build the element x 0 to be R-collapsible to any element of {a 0,..., a m }. (This can be achieved by defining x 0 = f(e 1, {a 0,..., a m }, ): When we need to R- collapse x 0 to a we set the previously undefined ϕ e1 () to be ϕ e1 () = a, and use properties of f to conclude that x 0 R a, as long as a is not R-equivalent to any other a i.) These x 0 s will be used to R-collapse any other x i or y into {a 0,..., a m }, by previously R-collapsing it to x 0. The role of x i will be to allow y to R-collapse with y i. To be more precise, for > 0, y will be built to be R-collapsible with any element in Y = {x 1,..., x 1 } {x2 0 } through its definition as y = f(e 2, Y, 0), and x i Y will be built to be R-collapsible to any element in {y i, x 2i+1 0 } through its definition as x i = f(e 2i+1, {y i, x0 2i+1 }, ). If for instance > m and we want to R-collapse y to y i since we see that i and S-collapse (we may assume that i < ), then we distinguish the two possible cases: If i m, then define ϕ e2 (0) = x 2 0 and then ϕ e1 () = a i ; if m < i <, then define ϕ e2 (0) = x i and ϕ e2i+1 () = y i. We must of course mae sure that these are the only R-collapses that we allow in this way for the y s, and more generally between the elements of our arrays {x i, y n} i,,n ω : This can be

10 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI achieved by arguing that if this were not the case then we would be eventually able to apply a special procedure, called Action, consisting in laying down suitable additional R-collapses, that would lead to the conclusion that there is a pair of distinct i, m such that a i R a. Thus, if there is no such pair we in fact do not tae Action, excluding the possibility of unwanted R-collapses. Formally, define the computable arrays {x i } i, ω and {y n } n ω as follows: Let x 0 = f(e 1, {a 0,..., a m }, ). Given {x i } i<n+1, ω, define y n+1 = f(e 2n+2, Y n+1, 0), where Y n+1 = {x n+1 i 0 < i < n + 1} {x 2n+2 0 }, and, for ω, x n+1 = f(e 2n+3, {y n+1, x 2n+3 0 }, ). We assume (see Lemma 1.1) that during each stage of the construction, exactly one pair of distinct S-equivalence classes collapses, and we always assume that [i] S represents an S-equivalence class with smallest member i. During the construction, to identify y n with c means to define ϕ e2n (0) = c, and similarly to identify x n with c means to define ϕ e2n+1 () = c. Definition of {a } >m. We let a = y for > m. The a s will be the marers that code S in R, the other numbers x i, y i are simply representatives of auxiliary classes which will assist in R-collapsing the a s. Construction of ϕ ei. During the construction, if we ever discover that a i R a, for some i < m, then we can ignore the rest of the construction below, and continue the construction trivially for the sae of uniformity, since the woring assumption that a i R a, for all i < m, is violated. At stage s of the construction, let [i] S and [] S be the pair of collapsing S-classes. If i, m, we can ignore the rest of the construction below and continue trivially for the sae of uniformity, otherwise there are two cases. Case 1 : i m <. We identify y with x 2 0 (clearly y cannot have been previously identified) and wait for either y R x 2 0 or two elements of Y to R- collapse. If the latter happens first, then tae Action, otherwise we identify x 2 0 with a i, and wait for x 2 0 R a i. Case 2 : m < i <. Identify y with x i, and wait for y R x i or two elements of Y to R-collapse. Again, if the latter happens first, tae Action, otherwise we identify x i with y i. Wait for either x i R y i or y i R x 2i+1 0. If the latter happens first, tae Action, otherwise we achieve y R y i. Action : We arrived here because we found y i R x 2i+1 0 or two elements of Y have R-collapsed (and no element of Y has previously been identified). We describe two procedures P and Q which will call each other recursively until we force an R-collapse in a 0,..., a m. Procedure P : This is called when y R x 2+1 0. Perform the following steps. (Step i) Chec if y has been previously identified. If so, then by construction y R a for some least <. If m then go to Step (ii). Otherwise, y has not been previously identified, and we identify y with x 2 0. Wait

UNIVERSAL CEERS 11 for either y R x 2 0 or two elements of Y to R-collapse. In the latter case we call Q (noting that no element in Y has been previously identified since y has not), otherwise we identify x 2 0 with a 0 and wait for x0 2 R a 0. Lastly, if y has not been previously identified, we identify y with x 2 0 and proceed as above, where we either call Q or we get x 2 0 R a 0. In either case, now continue with Step (ii). (Step ii) If this step is reached then we have y R a for some m. Clearly x 2+1 0 has not previously been identified. We now identify x 2+1 0 with a for any, m. We then obtain a R a, and continue the construction trivially for the sae of uniformity. Procedure Q : This is called when two (least) elements in Y R-collapse (and no element of Y has been previously identified). There are two cases. (Case i) The two elements are x 2 0 and x i, 0 < i <. Identify x i with x0 2i+1 and wait for x i R x 2i+1 0 or y i R x0 2i+1. In the latter case call P i, otherwise we now identify x 2i+1 0 (not previously identified) with a 1 and wait for the R-collapse. Now identify x 2 0 with a 0 and wait for the R-collapse. We succeed in forcing a 0 R a 1, and continue the construction trivially for the sae of uniformity. (Case ii) The two elements are x i and x, 0 < i < <. Follow Case i to force that either x i R a 0 and x R a 1 or one of P i or P is called. This ends the description of the procedures P and Q. Suppose we arrive at this action because we found y i R x 2i+1 0. We call P i. On the other hand, if we arrive because two elements of Y have R-collapsed then we call Q. Clearly only finitely many different procedures can be called, and we end up provoing an R-collapse within a 0,..., a m. Enforcing non-collapse. At the end of stage s, chec if there exist two elements of {a n, x n} n, ω which have R-collapsed but have not yet been identified. (Case i) The two elements are a i and a for i < m. Continue the construction trivially for the sae of uniformity. (Case ii) The two elements are a i and a for i m <. Identify y with x 2 0 and wait for the desired R-collapse, where we will identify x 2 0 with a i for any i i, i m. If we instead find that two elements of Y have R-collapsed, we tae Action. (Case iii) The two elements are a i and x for i m. If > 0 we identify x with x 2+1 0 and wait for the R-collapse. We then identify x 2+1 0 with a i for any i m with i i. If we instead find that y R x 2+1 0, we tae Action. The case = 0 is trivial, by immediately identifying x 0 with a i. (Otherwise) For each of the remaining cases, we can follow Case ii or Case iii to force an R-collapse in a 0,..., a m. Verification. We list some easy facts about the construction.

12 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI If any element of Y is identified then the same action must identify y, or provoe an R-collapse among a 0,..., a m, and thus the construction is continued trivially for the sae of uniformity. If y is identified during the construction then we will either provoe an R-collapse among a 0,..., a m, or force y R a i for some i < where i S. If x 2+1 0 is ever identified during the construction then the same action will provoe an R-collapse among a 0,..., a m. Therefore, any call to identify y or x i during the construction must be successful. Now we assume that a 0,..., a m are in distinct R-equivalence classes. Then the construction is never continued trivially, and we never tae Action. At the end of every stage s, we have that i S if and only if a i R a. The left to right direction is ensured by Case 1 and Case 2 of the construction, while the right to left is ensured by the enforcing non-collapse action. Lemma 3.11. Every strongly u.m.c. ceer is u.e.i. Proof. Let R be a strongly u.m.c. ceer. Let U, V be a fixed pair of e.i. sets, and define S to be the ceer x S y [ x = y or x, y U or x, y V ]. Fix u U, v V, and given a, b, consider the assignment (u, v) (a, b). Using the fact that R is strongly u.m.c., uniformly extend it to a computable function f a,b. If [a] R [b] R =, then f a,b uniformly m-reduces the e.i. pair (U, V ) to the pair ([a] R, [b] R ), showing that the latter is e.i. (for this property of e.i. pairs, see, e.g., [29]). The fact that R is u.e.i. follows from the uniformity in this argument. The following is a natural companion to Lemma 3.6. Corollary 3.12. A nontrivial ceer R is strongly u.m.c. if for every ceer S and every assignment (a 0, a 1,..., a m) (a 0, a 1,..., a m ), the assignment can be extended uniformly to a total computable function giving a reduction from S to R, provided the a i are pairwise not S-equivalent and the a i are pairwise not R- equivalent, for every i m. Proof. By Theorem 3.7 and the proof of Lemma 3.10. We note that in the above corollary and in the definition of a strongly u.m.c. ceer, the condition m > 0 is necessary as removing this condition implies that R has a total diagonal function g (see the definition of an e-complete ceer, given earlier) defined in the following way: Given a, consider the ceer Id 2 having only two equivalence classes [0] Id2, [1] Id2, and extend the assignment 0 a to a total computable function f inducing a reduction from Id 2 to R; finally tae g(a) = f(1). On the other hand, the property of having a total diagonal function is not necessarily possessed by all u.e.i. ceers, since this property characterizes the e-complete ceers within the class of all u.f.p. as we have already recalled before Definition 3.3. Proposition 3.13. Each strongly u.m.c. ceer is u.m.c., but there are u.m.c. ceers that are not strongly u.m.c.

UNIVERSAL CEERS 13 Proof. It is clear that every strongly u.m.c. ceer is u.m.c., so by Theorem 3.7 it is enough to argue that some u.m.c. R is not u.e.i. The proof proceeds by a finite inury argument, which builds a ceer R satisfying the following requirements: for every ceer R e and assignment (a 0, a 1 ) (a 0, a 1 ) (where we suppose that in requirement R e, the assignment is also coded by e), and partial computable function ϕ e : R e : if a 0 R e a 1 and a 0 R e a 1, then there is a total extension reducing R e to R, Q e : R is not u.e.i. via the function ϕ e. The priority ordering is R 0 < Q 0 < R 1 <. We use the fact that no effectivity is required in satisfying R e by allowing the requirements to be inured. That is, we can change our mind about the extension, for each R e, finitely many times. As in the proof of Lemma 3.10, without loss of generality we assume that a i = i for i 1. We denote the pair (a 0, a 1 ) (for requirement R e ) by a e. R will be nontrivial since R does not have any uniform productive function. We denote by X e,s the (modified) i th column of ω, i.e., the set of elements X e,s () with X e,s () = i, where i = e, s + 1, a e, if > 1, and X e,s () = a if 1. (Note that thus the modified columns are not necessarily pairwise disoint, but any possible overlap between columns are at the first two elements.) This set will be used by R e to code R e : To code R e into X e,t at some stage s of the construction means to R-collapse X e,t (i) and X e,t () if i R e unless i, 1. We write X e instead of X e,t when the context is clear, and sometimes call it the R e -column. For a tuple b we say that b R x if there exists some entry b i in b such that b i R x. Construction of R. At each stage s, perform the following two steps. Step 1 : Pic the least e such that Q e requires attention. This means either the pair of Q e -followers y 0 e, y 1 e is not yet piced, or else ϕ e (y 0 e, y 1 e, z 0 e, z 1 e) W z 0 e W z 1 e. Here, W z i e denotes the final R-equivalence class of y i e, of which we suppose to now an index by the Recursion Theorem. For convenience, when ϕ e (y 0 e, y 1 e, z 0 e, z 1 e) we denote ϕ e (y 0 e, y 1 e, z 0 e, z 1 e) = f e. Clearly some e < s must be found. If the Q e -followers are not defined, we pic a distinct fresh pair y 0 e, y 1 e from X 0, 1 (in particular, larger than any element of a i for a higher-priority R i -requirement, or follower y i for a higher-priority Q i - requirement). If the second case holds we R-collapse f e and y 0 e. In either case we initialize all lower-priority requirements, i.e., for a Q -requirement we reset the followers, and for an R -requirement we are now ready to code R into X,t for a fresh number t: To prevent R from interfering with the other higher priority requirements, we can pic t such that, t + 1, 2 > any element in a, for all <. Step 2 : For each < s we code R into X. If there exists a least < s such that the action at Step 1 or 2 collapses the two classes in a, we mae R inactive and initialize all lower-priority requirements.

14 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI We now verify that the requirements are satisfied. Clearly each requirement is initialized finitely often. The ey lemma below says that during the construction, each class targeted for a Q- or R-requirement does not contain elements which are bad for the requirement. Lemma 3.14. Let s be a stage of the construction. The following items hold at s: (i) If a i R X i (n i ) for some n i, then for every x R X i (n i ), we have x X i (2). (ii) If f i R y n i i then for every x R y n i i, we have x y n i i. (iii) Suppose X i (n i ) R X (n ) for some i,, n i, n. Then (iv) Suppose X i (n i ) R y n (v) Suppose y n i i we have i a i a R X i (n i ). for some i,, n i, n. Then f R X i (n i ) a i R X i (n i ) and < i. R y n and y n i i y n f R y n. for some i, n i, n. Then i and We explain what each of the items (i) through (v) mean. (i) says that for each class [X i (n i )] R, with X i (n i ) in the R i -column, if it contains an element x not initially in the class, then x must necessarily belong to a column of lower priority, unless R i itself has already acted to collapse X i (n i ) to a i. (ii) expresses a similar fact for a Q i -requirement. It says that if the Q i -follower y n i i is related to a number x which is new, then this number must belong to a column of lower priority, unless Q i has already acted to collapse f i with y n i i. The items (iii)-(v) give specific details about the ind of elements which may be allowed to be collapsed to a given column. (iii) says that if some X i (n i ), in the R i -column, is collapsed with some X (n ) in the R -column, where i, then it must be that either R i or R has previously acted to collapse X i (n i ) with a i, or X i (n ) with a. Hence (iii) says that it is impossible for two R-columns woring for different requirements to be collapsed unless one of the two R-requirements has already performed coding into the column. (iv) investigates when elements of an R i -column can collapse with elements in a column containing a Q -follower. It says that the only way this can happen is if either the Q -requirement has acted to collapse y n with f (and hence will never act again in the future), or if R i has already collapsed X i (n i ) with a i. Lastly (v) asserts that the only way for a Q i -follower to be collapsed with a Q -follower for i, is when the lower-priority one of the two acts to cause the collapse. This lemma then enables us to later verify that the R-requirements are met. To see this, consider two R-columns which the R-requirements want to eep distinct. To argue that these two columns are never unintentionally collapsed during the construction, note that parts (iii)-(v) of the lemma say that the foreign elements introduced into these columns during the construction must be targeted for other requirements, say R or Q, that have already acted for these columns. Hence neither R nor Q will ever again do anything directly with these columns.

UNIVERSAL CEERS 15 Proof of Lemma 3.14. At each stage s of the construction we tae finitely many actions. We proceed by induction on this sequence of actions. At stage s = 0 before any action is taen, every equivalence class starts off as a singleton, so (i)-(v) are clearly true. Suppose (i)-(v) holds at a certain point at stage s. We consider the next action and argue that (i)-(v) still holds after this action. We consider the different cases. Suppose we are collapsing f i and yi 0 in Step 1 (henceforth, while analyzing Step 1, this will be nown as the action ). Since f i R yi 0 holds before this action, this means (by induction hypothesis on (iv)) that for every, n, if X (n ) R yi 0 then a R yi 0, and i <. Let us now verify that each of (i)-(v) holds after this next action. (iii) Fix X (n ) R X (n ) where. If this was true before the action then we apply the induction hypothesis. Let us assume otherwise that X (n ) and X (n ) are collapsed by the action. Hence we must have (without loss of generality) that both X (n ) R yi 0 and X (n ) R f i hold before the action. By induction hypothesis (iv) on X (n ) R yi 0, we conclude that a R X (n ). Hence (iii) holds after the action. (iv) In a similar way we verify that (iv) holds after this action. Suppose that X (n ) R y n. We assume that these two elements are collapsed by the action, hence we either have X (n ) R f i and y n R yi 0, or the symmetric case X (n ) R yi 0 and y n R f i holds. Observe that i because otherwise the action will cause Q to be initialized. In the first case we may assume that y n yi 0 because otherwise = i and we are immediately done. Hence we can apply the induction hypothesis (v) on y n R yi 0 to conclude that f i R yi 0 before the action, but this is impossible. Let us assume now that the latter symmetric case holds, i.e., X (n ) R yi 0 and y n R f i. We apply the induction hypothesis (iv) on X (n ) R yi 0 to conclude that a R X (n ) and > i. We already remared above that i must be true. Hence < and (iv) is verified. (v) Suppose that y n R y n and these two numbers are different. Without loss of generality assume that y n R f i and y n R yi 0. Since this action causes all lower-priority requirements to be initialized, we must have, i. Clearly i because otherwise the construction would not have collapsed f i and yi 0. If = i then we are immediately done for (v). Hence we assume that < i, and applying the inductive hypothesis regarding y n R yi 0, we get that f i R yi 0 before the action, a contradiction. (i) We fix, n such that a R X (n ). If X (n ) is related to neither f i nor yi 0 before the action, then once again we have that (i) holds by applying the induction hypothesis. X (n ) R yi 0 before the action is not possible by the induction hypothesis (iv). Hence it must be that X (n ) R f i before the action. If R is of lower priority than Q i then R is initialized after this action and so (i) is trivially true (since each fresh equivalence class is a singleton). Otherwise, R is of higher priority, which means that X (2) yi 0, so by induction hypothesis (i)-(ii), we obtain (i). (ii) We proceed similarly as in (i).

16 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI We now consider the next action in Step 2. Fix i < s and consider the action of coding R i into X i (henceforth action refers to this). There are two cases. Case 1 : We have that X i (n) and X i (n ) are collapsed, where a i R X i (n) and a i R X i (n ) (before the action). We run through each case. (iii) Consider X (n ) R X i (n) and X (n ) R X i (n ), where. Hence i is not equal to one of or. Apply the induction hypothesis (iii) on the appropriate pair. (iv) Apply induction hypothesis (iv). (v) Consider y n R X i (n) and y n R X i (n ). By induction hypothesis (iv), we have f R y n and f R y n, and clearly. (i) Consider, n such that a R X (n ), and X (n ) R X i (n). The case i is impossible by induction hypothesis (iii). So assume = i. By induction hypothesis, both classes [X i (n)] R and [X i (n )] R contain only numbers no smaller than X i (2), so we are again done. (ii) Trivially true. Case 2 : We have a i R X i (n) and a i R X i (n ). Again we consider each case separately. (iii) A straightforward application of the induction hypothesis (iii). (iv) Consider y n R X (n ). If y n R X i (n ) then f R X i (n ) by induction hypothesis (iv), which means (iv) must be true. Hence we may assume that y n R X i (n), and that f R y n. By the induction hypothesis (iv) on y n R X i (n), we must have < i. We have X (n ) R X i (n ). If = i then we are done, so assume i. Hence by induction hypothesis (iii), we have a R X i (n ). If < i then by construction X i (2) > each element in a, contradicting the induction hypothesis (i). Hence we must have > i >, so we have (iv). R X i (n) and y n (v) Fix y n R X i (n ) and y n y n. We have, by the induction hypothesis (iv), f R X i (n ). If f R X i (n) then and (v) holds. So suppose that f R X i (n). By the induction hypothesis (i)-(ii), we get that Q < R i < Q. To wit, by induction hypothesis on (i) and the fact that a i R X i (n ) and y n R X i (n ), we conclude that y n X i (2). Therefore Q is of lower priority than R i because otherwise, R i would pic X i (2) to be larger than y n. To conclude that Q is of higher priority than R i, we apply the induction hypothesis (ii) to conclude that some element in a i is y n, whereas, if Q were of lower priority, then it would pic y n larger than X i (2). Hence we have (v). (i) Fix X (n ) where a R X (n ). If = i then the claim is trivial, so assume i. By induction hypothesis (iii), we conclude that X (n ) R X i (n ), and hence X (n ) R X i (n). By the induction hypothesis (i) applied to X (n ), we have < i. Now by the induction hypothesis (i), this time applied to X i (n ), and the fact that X i (2) > X (2), we obtain (i). (ii) Fix y n y n R X i (n) where f R y n (again by induction hypothesis (iv), R X i (n ) is impossible). Then by the induction hypothesis (ii), Q is

UNIVERSAL CEERS 17 of higher priority than R i, which means that X i (2) > y n. Thus by the induction hypothesis (i) applied to X i (n ), we have (ii). We now argue that each Q e is met. Fix a stage after which Q e is never initialized, and let ye, 0 ye 1 be the final Q e followers. By Lemma 3.14(v), ye 0 R ye. 1 Thus if ϕ e (ye, 0 ye, 1 ze, 0 ze) 1 f e then yey 0 e 1 R f e, hence ϕ e cannot be the function witnessing that the ceer is u.e.i. Now consider R e and a stage after which it is never initialized. Let X e be the final version of the modified e th column. We claim that for i or 2, i R e if and only if X e (i) R X e (). The left to right implication is explicitly ensured by the construction. Suppose that X e (i) is collapsed with X e () at some stage s in the construction, by some action which is not the coding of R e. There are again two cases. Case 1 : The collapse is due to coding of R for e. We may assume that X (l) R X e (i) and X (l ) R X e (). We do not worry about the case when a e R X e (i) and a e R X e (), since we would mae R e inactive after this action. Assume that a e R X e (i) and a e R X e (). By Lemma 3.14(iii) we have a R X (l) and a R X (l ), but by construction we would not have collapsed X (l) and X (l ). Now assume that a e R X e (i) and a e R X e (). By Lemma 3.14(i) and (iii) we get that e <. Now since a R X (l ) by Lemma 3.14(i) and (iii) again we get that < e, a contradiction. Case 2 : The collapse is due to action in Step 1. Assume we collapsed y 0 R X e (i) with f R X e (). Since f R y 0 before this action, by Lemma 3.14(iv) we have a e R X e (i) and < e, hence R e will get initialized, a contradiction. Question 3.15. Do the u.f.p. ceers coincide with the wealy u.f.p. ceers? Corollary 3.16 below subsumes all universality results nown in the literature, and is a natural companion of classical results, including: Every creative set is m-complete (Myhill [26]); every pair of effectively inseparable sets is m-complete (Smullyan [31]); all creative sequences are m-complete (Cleave [7]). Corollary 3.16. Every u.e.i. ceer is universal. Proof. Immediate by Theorem 3.7, as every strongly u.m.c. (or even u.m.c.) ceer is clearly universal: If R is a u.m.c. ceer, and S is any ceer with two distinct equivalence classes, then start off with an assignment (a 0, a 1 ) (a 0, a 1 ) with a 0 S a 1 and a 0 R a 1, and extend it to a full reduction. Corollary 3.17. A ceer R is universal if and only if there exists a u.e.i. ceer S with S R. Proof. If R is universal and S is u.e.i., then trivially S R. Conversely, if S is u.e.i. and S R, then R is universal, since so is S, by Corollary 3.16. Remar 3.18. Of course, if R is a universal ceer, then for every ceer S, we have that R S is also universal. So there are universal ceers that are not u.e.i., in fact not even e.i. The following theorem shows that uniformity is essential in proving that u.e.i. ceers are universal:

18 ANDREWS, LEMPP, MILLER, NG, SAN MAURO, AND SORBI Theorem 3.19. There exists an e.i. ceer that is not universal. Proof. To show the result, we build computable approximations as in Lemma 1.1, to ceers R and S, such that R is e.i., and S R. At any stage, a number is new if it is bigger than any number so far used in the construction. The construction of R and S will satisfy the following requirements, for all numbers a, b, : P a,b : [a] R [b] R = f a,b is a productive function for the pair ([a] R, [b] R ), N : ϕ does not witness S R, where f a,b is a total computable function we build. In fact, P a,b should be written as P {a,b} with a < b (thus P a,b = P b,a : Of course f b,a can be easily obtained from f a,b ), and one should thin of the P -requirements as linearly ordered according to the canonical index of {a, b}. In order to achieve that ϕ does not reduce S to R, strategy N will use four witnesses a 0 (), a 1 (), b 0 (), b 1 (). At any stage we say that we initialize P a,b if, at this stage, we set f a,b = ; and we initialize N if we set the witnesses a 0 (), a 1 (), b 0 (), b 1 () to be undefined. We must also mae sure that R is not trivial. Strategy for P a,b. We say that P a,b becomes inactive at stage s + 1 (and stays inactive ever after) if either a is not the least element of [a] R s+1 or b is not the least element of [b] R s+1. If P a,b first becomes inactive at s + 1, then it initializes all strategies of lower priority. If P a,b is not inactive at stage s + 1, then we extend the definition of f a,b to the next (by code) pair (u, v) and correct the already defined values of f a,b as follows: (1) Define f a,b (u, v) = m, where m is new; (2) If f a,b (u, v ) = m has been already defined at previous stages, then (a) R-collapse m and b, if m W u at the current stage; (b) R-collapse m and a, if m W v at the current stage. Outcomes of strategy P a,b. Notice that in (2a) we mae [b] R W v if W u W v = ; similarly, under the same assumptions, we mae [a] R W u in (2b). Thus if [a] R W u, [b] R W v, and W u W v = then f a,b (u, v) / W u W v. So if P a,b requires attention infinitely often, eventually without being initialized, then f a,b is a total productive function for the pair ([a] R, [b] R ). Strategy for N. The strategy aims at maing S not reducible to R via ϕ : (1) Appoint numbers a 0, a 1, b 0, b 1, which are new (hence, for every x, y {a 0, a 1, b 0, b 1 } such that x y, we have x S y, at the current stage). (2) Wait for ϕ (a 0 ) and ϕ (b 0 ) : (a) If already ϕ (a 0 ) R ϕ (b 0 ), then do nothing. (b) Otherwise, S-collapse a 0 and b 0, and initialize lower-priority strategies; and (c) if later ϕ (a 0 ) R ϕ (b 0 ) (notice that, by the initialization undertaen in the previous item, this can happen only due to the action of higherpriority strategies), then repeat the previous steps with a 1, b 1 in place of a 0, b 0 respectively; more specifically, go to stage (2) with a 1, b 1 in place of a 0, b 0 respectively.