What Is the Church-Turing Thesis?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
“The Church-Turing “Thesis” As a Special Corollary of Gödel's
“The Church-Turing “Thesis” as a Special Corollary of Gödel’s Completeness Theorem,” in Computability: Turing, Gödel, Church, and Beyond, B. J. Copeland, C. Posy, and O. Shagrir (eds.), MIT Press (Cambridge), 2013, pp. 77-104. Saul A. Kripke This is the published version of the book chapter indicated above, which can be obtained from the publisher at https://mitpress.mit.edu/books/computability. It is reproduced here by permission of the publisher who holds the copyright. © The MIT Press The Church-Turing “ Thesis ” as a Special Corollary of G ö del ’ s 4 Completeness Theorem 1 Saul A. Kripke Traditionally, many writers, following Kleene (1952) , thought of the Church-Turing thesis as unprovable by its nature but having various strong arguments in its favor, including Turing ’ s analysis of human computation. More recently, the beauty, power, and obvious fundamental importance of this analysis — what Turing (1936) calls “ argument I ” — has led some writers to give an almost exclusive emphasis on this argument as the unique justification for the Church-Turing thesis. In this chapter I advocate an alternative justification, essentially presupposed by Turing himself in what he calls “ argument II. ” The idea is that computation is a special form of math- ematical deduction. Assuming the steps of the deduction can be stated in a first- order language, the Church-Turing thesis follows as a special case of G ö del ’ s completeness theorem (first-order algorithm theorem). I propose this idea as an alternative foundation for the Church-Turing thesis, both for human and machine computation. Clearly the relevant assumptions are justified for computations pres- ently known. -
CS 154 NOTES Part 1. Finite Automata
CS 154 NOTES ARUN DEBRAY MARCH 13, 2014 These notes were taken in Stanford’s CS 154 class in Winter 2014, taught by Ryan Williams. I live-TEXed them using vim, and as such there may be typos; please send questions, comments, complaints, and corrections to [email protected]. Thanks to Rebecca Wang for catching a few errors. CONTENTS Part 1. Finite Automata: Very Simple Models 1 1. Deterministic Finite Automata: 1/7/141 2. Nondeterminism, Finite Automata, and Regular Expressions: 1/9/144 3. Finite Automata vs. Regular Expressions, Non-Regular Languages: 1/14/147 4. Minimizing DFAs: 1/16/14 9 5. The Myhill-Nerode Theorem and Streaming Algorithms: 1/21/14 11 6. Streaming Algorithms: 1/23/14 13 Part 2. Computability Theory: Very Powerful Models 15 7. Turing Machines: 1/28/14 15 8. Recognizability, Decidability, and Reductions: 1/30/14 18 9. Reductions, Undecidability, and the Post Correspondence Problem: 2/4/14 21 10. Oracles, Rice’s Theorem, the Recursion Theorem, and the Fixed-Point Theorem: 2/6/14 23 11. Self-Reference and the Foundations of Mathematics: 2/11/14 26 12. A Universal Theory of Data Compression: Kolmogorov Complexity: 2/18/14 28 Part 3. Complexity Theory: The Modern Models 31 13. Time Complexity: 2/20/14 31 14. More on P versus NP and the Cook-Levin Theorem: 2/25/14 33 15. NP-Complete Problems: 2/27/14 36 16. NP-Complete Problems, Part II: 3/4/14 38 17. Polytime and Oracles, Space Complexity: 3/6/14 41 18. -
Revisiting Gödel and the Mechanistic Thesis Alessandro Aldini, Vincenzo Fano, Pierluigi Graziani
Theory of Knowing Machines: Revisiting Gödel and the Mechanistic Thesis Alessandro Aldini, Vincenzo Fano, Pierluigi Graziani To cite this version: Alessandro Aldini, Vincenzo Fano, Pierluigi Graziani. Theory of Knowing Machines: Revisiting Gödel and the Mechanistic Thesis. 3rd International Conference on History and Philosophy of Computing (HaPoC), Oct 2015, Pisa, Italy. pp.57-70, 10.1007/978-3-319-47286-7_4. hal-01615307 HAL Id: hal-01615307 https://hal.inria.fr/hal-01615307 Submitted on 12 Oct 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Theory of Knowing Machines: Revisiting G¨odeland the Mechanistic Thesis Alessandro Aldini1, Vincenzo Fano1, and Pierluigi Graziani2 1 University of Urbino \Carlo Bo", Urbino, Italy falessandro.aldini, [email protected] 2 University of Chieti-Pescara \G. D'Annunzio", Chieti, Italy [email protected] Abstract. Church-Turing Thesis, mechanistic project, and G¨odelian Arguments offer different perspectives of informal intuitions behind the relationship existing between the notion of intuitively provable and the definition of decidability by some Turing machine. One of the most for- mal lines of research in this setting is represented by the theory of know- ing machines, based on an extension of Peano Arithmetic, encompassing an epistemic notion of knowledge formalized through a modal operator denoting intuitive provability. -
Computability and Incompleteness Fact Sheets
Computability and Incompleteness Fact Sheets Computability Definition. A Turing machine is given by: A finite set of symbols, s1; : : : ; sm (including a \blank" symbol) • A finite set of states, q1; : : : ; qn (including a special \start" state) • A finite set of instructions, each of the form • If in state qi scanning symbol sj, perform act A and go to state qk where A is either \move right," \move left," or \write symbol sl." The notion of a \computation" of a Turing machine can be described in terms of the data above. From now on, when I write \let f be a function from strings to strings," I mean that there is a finite set of symbols Σ such that f is a function from strings of symbols in Σ to strings of symbols in Σ. I will also adopt the analogous convention for sets. Definition. Let f be a function from strings to strings. Then f is computable (or recursive) if there is a Turing machine M that works as follows: when M is started with its input head at the beginning of the string x (on an otherwise blank tape), it eventually halts with its head at the beginning of the string f(x). Definition. Let S be a set of strings. Then S is computable (or decidable, or recursive) if there is a Turing machine M that works as follows: when M is started with its input head at the beginning of the string x, then if x is in S, then M eventually halts, with its head on a special \yes" • symbol; and if x is not in S, then M eventually halts, with its head on a special • \no" symbol. -
A Compositional Analysis for Subset Comparatives∗ Helena APARICIO TERRASA–University of Chicago
A Compositional Analysis for Subset Comparatives∗ Helena APARICIO TERRASA–University of Chicago Abstract. Subset comparatives (Grant 2013) are amount comparatives in which there exists a set membership relation between the target and the standard of comparison. This paper argues that subset comparatives should be treated as regular phrasal comparatives with an added presupposi- tional component. More specifically, subset comparatives presuppose that: a) the standard has the property denoted by the target; and b) the standard has the property denoted by the matrix predi- cate. In the account developed below, the presuppositions of subset comparatives result from the compositional principles independently required to interpret those phrasal comparatives in which the standard is syntactically contained inside the target. Presuppositions are usually taken to be li- censed by certain lexical items (presupposition triggers). However, subset comparatives show that presuppositions can also arise as a result of semantic composition. This finding suggests that the grammar possesses more than one way of licensing these inferences. Further research will have to determine how productive this latter strategy is in natural languages. Keywords: Subset comparatives, presuppositions, amount comparatives, degrees. 1. Introduction Amount comparatives are usually discussed with respect to their degree or amount interpretation. This reading is exemplified in the comparative in (1), where the elements being compared are the cardinalities corresponding to the sets of books read by John and Mary respectively: (1) John read more books than Mary. |{x : books(x) ∧ John read x}| ≻ |{y : books(y) ∧ Mary read y}| In this paper, I discuss subset comparatives (Grant (to appear); Grant (2013)), a much less studied type of amount comparative illustrated in the Spanish1 example in (2):2 (2) Juan ha leído más libros que El Quijote. -
Interpretations and Mathematical Logic: a Tutorial
Interpretations and Mathematical Logic: a Tutorial Ali Enayat Dept. of Philosophy, Linguistics, and Theory of Science University of Gothenburg Olof Wijksgatan 6 PO Box 200, SE 405 30 Gothenburg, Sweden e-mail: [email protected] 1. INTRODUCTION Interpretations are about `seeing something as something else', an elusive yet intuitive notion that has been around since time immemorial. It was sys- tematized and elaborated by astrologers, mystics, and theologians, and later extensively employed and adapted by artists, poets, and scientists. At first ap- proximation, an interpretation is a structure-preserving mapping from a realm X to another realm Y , a mapping that is meant to bring hidden features of X and/or Y into view. For example, in the context of Freud's psychoanalytical theory [7], X = the realm of dreams, and Y = the realm of the unconscious; in Khayaam's quatrains [11], X = the metaphysical realm of theologians, and Y = the physical realm of human experience; and in von Neumann's foundations for Quantum Mechanics [14], X = the realm of Quantum Mechanics, and Y = the realm of Hilbert Space Theory. Turning to the domain of mathematics, familiar geometrical examples of in- terpretations include: Khayyam's interpretation of algebraic problems in terms of geometric ones (which was the remarkably innovative element in his solution of cubic equations), Descartes' reduction of Geometry to Algebra (which moved in a direction opposite to that of Khayyam's aforementioned interpretation), the Beltrami-Poincar´einterpretation of hyperbolic geometry within euclidean geom- etry [13]. Well-known examples in mathematical analysis include: Dedekind's interpretation of the linear continuum in terms of \cuts" of the rational line, Hamilton's interpertation of complex numbers as points in the Euclidean plane, and Cauchy's interpretation of real-valued integrals via complex-valued ones using the so-called contour method of integration in complex analysis. -
Church's Thesis and the Conceptual Analysis of Computability
Church’s Thesis and the Conceptual Analysis of Computability Michael Rescorla Abstract: Church’s thesis asserts that a number-theoretic function is intuitively computable if and only if it is recursive. A related thesis asserts that Turing’s work yields a conceptual analysis of the intuitive notion of numerical computability. I endorse Church’s thesis, but I argue against the related thesis. I argue that purported conceptual analyses based upon Turing’s work involve a subtle but persistent circularity. Turing machines manipulate syntactic entities. To specify which number-theoretic function a Turing machine computes, we must correlate these syntactic entities with numbers. I argue that, in providing this correlation, we must demand that the correlation itself be computable. Otherwise, the Turing machine will compute uncomputable functions. But if we presuppose the intuitive notion of a computable relation between syntactic entities and numbers, then our analysis of computability is circular.1 §1. Turing machines and number-theoretic functions A Turing machine manipulates syntactic entities: strings consisting of strokes and blanks. I restrict attention to Turing machines that possess two key properties. First, the machine eventually halts when supplied with an input of finitely many adjacent strokes. Second, when the 1 I am greatly indebted to helpful feedback from two anonymous referees from this journal, as well as from: C. Anthony Anderson, Adam Elga, Kevin Falvey, Warren Goldfarb, Richard Heck, Peter Koellner, Oystein Linnebo, Charles Parsons, Gualtiero Piccinini, and Stewart Shapiro. I received extremely helpful comments when I presented earlier versions of this paper at the UCLA Philosophy of Mathematics Workshop, especially from Joseph Almog, D. -
An Un-Rigorous Introduction to the Incompleteness Theorems∗
An un-rigorous introduction to the incompleteness theorems∗ phil 43904 Jeff Speaks October 8, 2007 1 Soundness and completeness When discussing Russell's logical system and its relation to Peano's axioms of arithmetic, we distinguished between the axioms of Russell's system, and the theorems of that system. Roughly, the axioms of a theory are that theory's basic assumptions, and the theorems are the formulae provable from the axioms using the rules provided by the theory. Suppose we are talking about the theory A of arithmetic. Then, if we express the idea that a certain sentence p is a theorem of A | i.e., provable from A's axioms | as follows: `A p Now we can introduce the notion of the valid sentences of a theory. For our purposes, think of a valid sentence as a sentence in the language of the theory that can't be false. For example, consider a simple logical language which contains some predicates (written as upper-case letters), `not', `&', and some names, each of which is assigned some object or other in each interpretation. Now consider a sentence like F n In most cases, a sentence like this is going to be true on some interpretations, and false in others | it depends on which object is assigned to `n', and whether it is in the set of things assigned to `F '. However, if we consider a sentence like ∗The source for much of what follows is Michael Detlefsen's (much less un-rigorous) “G¨odel'stheorems", available at http://www.rep.routledge.com/article/Y005. -
The Busy Beaver Frontier
Electronic Colloquium on Computational Complexity, Report No. 115 (2020) The Busy Beaver Frontier Scott Aaronson∗ Abstract The Busy Beaver function, with its incomprehensibly rapid growth, has captivated genera- tions of computer scientists, mathematicians, and hobbyists. In this survey, I offer a personal view of the BB function 58 years after its introduction, emphasizing lesser-known insights, re- cent progress, and especially favorite open problems. Examples of such problems include: when does the BB function first exceed the Ackermann function? Is the value of BB(20) independent of set theory? Can we prove that BB(n + 1) > 2BB(n) for large enough n? Given BB(n), how many advice bits are needed to compute BB(n + 1)? Do all Busy Beavers halt on all inputs, not just the 0 input? Is it decidable, given n, whether BB(n) is even or odd? 1 Introduction The Busy Beaver1 function, defined by Tibor Rad´o[13] in 1962, is an extremely rapidly-growing function, defined by maximizing over the running times of all n-state Turing machines that eventu- ally halt. In my opinion, the BB function makes the concepts of computability and uncomputability more vivid than anything else ever invented. When I recently taught my 7-year-old daughter Lily about computability, I did so almost entirely through the lens of the ancient quest to name the biggest numbers one can. Crucially, that childlike goal, if pursued doggedly enough, inevitably leads to something like the BB function, and hence to abstract reasoning about the space of possi- ble computer programs, the halting problem, and so on.2 Let's give a more careful definition. -
Enumerations of the Kolmogorov Function
Enumerations of the Kolmogorov Function Richard Beigela Harry Buhrmanb Peter Fejerc Lance Fortnowd Piotr Grabowskie Luc Longpr´ef Andrej Muchnikg Frank Stephanh Leen Torenvlieti Abstract A recursive enumerator for a function h is an algorithm f which enu- merates for an input x finitely many elements including h(x). f is a aEmail: [email protected]. Department of Computer and Information Sciences, Temple University, 1805 North Broad Street, Philadelphia PA 19122, USA. Research per- formed in part at NEC and the Institute for Advanced Study. Supported in part by a State of New Jersey grant and by the National Science Foundation under grants CCR-0049019 and CCR-9877150. bEmail: [email protected]. CWI, Kruislaan 413, 1098SJ Amsterdam, The Netherlands. Partially supported by the EU through the 5th framework program FET. cEmail: [email protected]. Department of Computer Science, University of Mas- sachusetts Boston, Boston, MA 02125, USA. dEmail: [email protected]. Department of Computer Science, University of Chicago, 1100 East 58th Street, Chicago, IL 60637, USA. Research performed in part at NEC Research Institute. eEmail: [email protected]. Institut f¨ur Informatik, Im Neuenheimer Feld 294, 69120 Heidelberg, Germany. fEmail: [email protected]. Computer Science Department, UTEP, El Paso, TX 79968, USA. gEmail: [email protected]. Institute of New Techologies, Nizhnyaya Radi- shevskaya, 10, Moscow, 109004, Russia. The work was partially supported by Russian Foundation for Basic Research (grants N 04-01-00427, N 02-01-22001) and Council on Grants for Scientific Schools. hEmail: [email protected]. School of Computing and Department of Mathe- matics, National University of Singapore, 3 Science Drive 2, Singapore 117543, Republic of Singapore. -
The Cyber Entscheidungsproblem: Or Why Cyber Can’T Be Secured and What Military Forces Should Do About It
THE CYBER ENTSCHEIDUNGSPROBLEM: OR WHY CYBER CAN’T BE SECURED AND WHAT MILITARY FORCES SHOULD DO ABOUT IT Maj F.J.A. Lauzier JCSP 41 PCEMI 41 Exercise Solo Flight Exercice Solo Flight Disclaimer Avertissement Opinions expressed remain those of the author and Les opinons exprimées n’engagent que leurs auteurs do not represent Department of National Defence or et ne reflètent aucunement des politiques du Canadian Forces policy. This paper may not be used Ministère de la Défense nationale ou des Forces without written permission. canadiennes. Ce papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as © Sa Majesté la Reine du Chef du Canada, représentée par represented by the Minister of National Defence, 2015. le ministre de la Défense nationale, 2015. CANADIAN FORCES COLLEGE – COLLÈGE DES FORCES CANADIENNES JCSP 41 – PCEMI 41 2014 – 2015 EXERCISE SOLO FLIGHT – EXERCICE SOLO FLIGHT THE CYBER ENTSCHEIDUNGSPROBLEM: OR WHY CYBER CAN’T BE SECURED AND WHAT MILITARY FORCES SHOULD DO ABOUT IT Maj F.J.A. Lauzier “This paper was written by a student “La présente étude a été rédigée par un attending the Canadian Forces College stagiaire du Collège des Forces in fulfilment of one of the requirements canadiennes pour satisfaire à l'une des of the Course of Studies. The paper is a exigences du cours. L'étude est un scholastic document, and thus contains document qui se rapporte au cours et facts and opinions, which the author contient donc des faits et des opinions alone considered appropriate and que seul l'auteur considère appropriés et correct for the subject. -
The Busy Beaver Competition: a Historical Survey Pascal Michel
The Busy Beaver Competition: a historical survey Pascal Michel To cite this version: Pascal Michel. The Busy Beaver Competition: a historical survey. 2017. hal-00396880v6 HAL Id: hal-00396880 https://hal.archives-ouvertes.fr/hal-00396880v6 Preprint submitted on 4 Sep 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. The Busy Beaver Competition: a historical survey Pascal MICHEL∗ Equipe´ de Logique Math´ematique, Institut de Math´ematiques de Jussieu–Paris Rive Gauche, UMR 7586, Bˆatiment Sophie Germain, case 7012, 75205 Paris Cedex 13, France and Universit´ede Cergy-Pontoise, ESPE, F-95000 Cergy-Pontoise, France [email protected] Version 6 September 4, 2019 Abstract Tibor Rado defined the Busy Beaver Competition in 1962. He used Turing machines to give explicit definitions for some functions that are not computable and grow faster than any computable function. He put forward the problem of computing the values of these functions on numbers 1, 2, 3, . .. More and more powerful computers have made possible the computation of lower bounds for these values. In 1988, Brady extended the definitions to functions on two variables. We give a historical survey of these works.