Formalizing Computability Theory Via Partial Recursive Functions Mario Carneiro Carnegie Mellon University, Pittsburgh, PA, USA [email protected]
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
“The Church-Turing “Thesis” As a Special Corollary of Gödel's
“The Church-Turing “Thesis” as a Special Corollary of Gödel’s Completeness Theorem,” in Computability: Turing, Gödel, Church, and Beyond, B. J. Copeland, C. Posy, and O. Shagrir (eds.), MIT Press (Cambridge), 2013, pp. 77-104. Saul A. Kripke This is the published version of the book chapter indicated above, which can be obtained from the publisher at https://mitpress.mit.edu/books/computability. It is reproduced here by permission of the publisher who holds the copyright. © The MIT Press The Church-Turing “ Thesis ” as a Special Corollary of G ö del ’ s 4 Completeness Theorem 1 Saul A. Kripke Traditionally, many writers, following Kleene (1952) , thought of the Church-Turing thesis as unprovable by its nature but having various strong arguments in its favor, including Turing ’ s analysis of human computation. More recently, the beauty, power, and obvious fundamental importance of this analysis — what Turing (1936) calls “ argument I ” — has led some writers to give an almost exclusive emphasis on this argument as the unique justification for the Church-Turing thesis. In this chapter I advocate an alternative justification, essentially presupposed by Turing himself in what he calls “ argument II. ” The idea is that computation is a special form of math- ematical deduction. Assuming the steps of the deduction can be stated in a first- order language, the Church-Turing thesis follows as a special case of G ö del ’ s completeness theorem (first-order algorithm theorem). I propose this idea as an alternative foundation for the Church-Turing thesis, both for human and machine computation. Clearly the relevant assumptions are justified for computations pres- ently known. -
The Partial Function Computed by a TM M(W)
CS601 The Partial Function Computed by a TM Lecture 2 8 y if M on input “.w ” eventually <> t M(w) halts with output “.y ” ≡ t :> otherwise % Σ Σ .; ; Usually, Σ = 0; 1 ; w; y Σ? 0 ≡ − f tg 0 f g 2 0 Definition 2.1 Let f :Σ? Σ? be a total or partial function. We 0 ! 0 say that f is a partial, recursive function iff TM M(f = M( )), 9 · i.e., w Σ?(f(w) = M(w)). 8 2 0 Remark 2.2 There is an easy to compute 1:1 and onto map be- tween 0; 1 ? and N [Exercise]. Thus we can think of the contents f g of a TM tape as a natural number and talk about f : N N ! being a recursive function. If the partial, recursive function f is total, i.e., f : N N then we ! say that f is a total, recursive function. A partial function that is not total is called strictly partial. 1 CS601 Some Recursive Functions Lecture 2 Proposition 2.3 The following functions are recursive. They are all total except for peven. copy(w) = ww σ(n) = n + 1 plus(n; m) = n + m mult(n; m) = n m × exp(n; m) = nm (we let exp(0; 0) = 1) 1 if n is even χ (n) = even 0 otherwise 1 if n is even p (n) = even otherwise % Proof: Exercise: please convince yourself that you can build TMs to compute all of these functions! 2 Recursive Sets = Decidable Sets = Computable Sets Definition 2.4 Let S Σ? or S N. -
Iris: Monoids and Invariants As an Orthogonal Basis for Concurrent Reasoning
Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning Ralf Jung David Swasey Filip Sieczkowski Kasper Svendsen MPI-SWS & MPI-SWS Aarhus University Aarhus University Saarland University [email protected] fi[email protected] [email protected] [email protected] rtifact * Comple * Aaron Turon Lars Birkedal Derek Dreyer A t te n * te A is W s E * e n l l C o L D C o P * * Mozilla Research Aarhus University MPI-SWS c u e m s O E u e e P n R t v e o d t * y * s E a [email protected] [email protected] [email protected] a l d u e a t Abstract TaDA [8], and others. In this paper, we present a logic called Iris that We present Iris, a concurrent separation logic with a simple premise: explains some of the complexities of these prior separation logics in monoids and invariants are all you need. Partial commutative terms of a simpler unifying foundation, while also supporting some monoids enable us to express—and invariants enable us to enforce— new and powerful reasoning principles for concurrency. user-defined protocols on shared state, which are at the conceptual Before we get to Iris, however, let us begin with a brief overview core of most recent program logics for concurrency. Furthermore, of some key problems that arise in reasoning compositionally about through a novel extension of the concept of a view shift, Iris supports shared state, and how prior approaches have dealt with them. -
A Note on Indicator-Functions
proceedings of the american mathematical society Volume 39, Number 1, June 1973 A NOTE ON INDICATOR-FUNCTIONS J. MYHILL Abstract. A system has the existence-property for abstracts (existence property for numbers, disjunction-property) if when- ever V(1x)A(x), M(t) for some abstract (t) (M(n) for some numeral n; if whenever VAVB, VAor hß. (3x)A(x), A,Bare closed). We show that the existence-property for numbers and the disjunc- tion property are never provable in the system itself; more strongly, the (classically) recursive functions that encode these properties are not provably recursive functions of the system. It is however possible for a system (e.g., ZF+K=L) to prove the existence- property for abstracts for itself. In [1], I presented an intuitionistic form Z of Zermelo-Frankel set- theory (without choice and with weakened regularity) and proved for it the disfunction-property (if VAvB (closed), then YA or YB), the existence- property (if \-(3x)A(x) (closed), then h4(t) for a (closed) comprehension term t) and the existence-property for numerals (if Y(3x G m)A(x) (closed), then YA(n) for a numeral n). In the appendix to [1], I enquired if these results could be proved constructively; in particular if we could find primitive recursively from the proof of AwB whether it was A or B that was provable, and likewise in the other two cases. Discussion of this question is facilitated by introducing the notion of indicator-functions in the sense of the following Definition. Let T be a consistent theory which contains Heyting arithmetic (possibly by relativization of quantifiers). -
Soft Set Theory First Results
An Inlum~md computers & mathematics PERGAMON Computers and Mathematics with Applications 37 (1999) 19-31 Soft Set Theory First Results D. MOLODTSOV Computing Center of the R~msian Academy of Sciences 40 Vavilova Street, Moscow 117967, Russia Abstract--The soft set theory offers a general mathematical tool for dealing with uncertain, fuzzy, not clearly defined objects. The main purpose of this paper is to introduce the basic notions of the theory of soft sets, to present the first results of the theory, and to discuss some problems of the future. (~) 1999 Elsevier Science Ltd. All rights reserved. Keywords--Soft set, Soft function, Soft game, Soft equilibrium, Soft integral, Internal regular- ization. 1. INTRODUCTION To solve complicated problems in economics, engineering, and environment, we cannot success- fully use classical methods because of various uncertainties typical for those problems. There are three theories: theory of probability, theory of fuzzy sets, and the interval mathematics which we can consider as mathematical tools for dealing with uncertainties. But all these theories have their own difficulties. Theory of probabilities can deal only with stochastically stable phenomena. Without going into mathematical details, we can say, e.g., that for a stochastically stable phenomenon there should exist a limit of the sample mean #n in a long series of trials. The sample mean #n is defined by 1 n IZn = -- ~ Xi, n i=l where x~ is equal to 1 if the phenomenon occurs in the trial, and x~ is equal to 0 if the phenomenon does not occur. To test the existence of the limit, we must perform a large number of trials. -
Enumerations of the Kolmogorov Function
Enumerations of the Kolmogorov Function Richard Beigela Harry Buhrmanb Peter Fejerc Lance Fortnowd Piotr Grabowskie Luc Longpr´ef Andrej Muchnikg Frank Stephanh Leen Torenvlieti Abstract A recursive enumerator for a function h is an algorithm f which enu- merates for an input x finitely many elements including h(x). f is a aEmail: [email protected]. Department of Computer and Information Sciences, Temple University, 1805 North Broad Street, Philadelphia PA 19122, USA. Research per- formed in part at NEC and the Institute for Advanced Study. Supported in part by a State of New Jersey grant and by the National Science Foundation under grants CCR-0049019 and CCR-9877150. bEmail: [email protected]. CWI, Kruislaan 413, 1098SJ Amsterdam, The Netherlands. Partially supported by the EU through the 5th framework program FET. cEmail: [email protected]. Department of Computer Science, University of Mas- sachusetts Boston, Boston, MA 02125, USA. dEmail: [email protected]. Department of Computer Science, University of Chicago, 1100 East 58th Street, Chicago, IL 60637, USA. Research performed in part at NEC Research Institute. eEmail: [email protected]. Institut f¨ur Informatik, Im Neuenheimer Feld 294, 69120 Heidelberg, Germany. fEmail: [email protected]. Computer Science Department, UTEP, El Paso, TX 79968, USA. gEmail: [email protected]. Institute of New Techologies, Nizhnyaya Radi- shevskaya, 10, Moscow, 109004, Russia. The work was partially supported by Russian Foundation for Basic Research (grants N 04-01-00427, N 02-01-22001) and Council on Grants for Scientific Schools. hEmail: [email protected]. School of Computing and Department of Mathe- matics, National University of Singapore, 3 Science Drive 2, Singapore 117543, Republic of Singapore. -
The Cyber Entscheidungsproblem: Or Why Cyber Can’T Be Secured and What Military Forces Should Do About It
THE CYBER ENTSCHEIDUNGSPROBLEM: OR WHY CYBER CAN’T BE SECURED AND WHAT MILITARY FORCES SHOULD DO ABOUT IT Maj F.J.A. Lauzier JCSP 41 PCEMI 41 Exercise Solo Flight Exercice Solo Flight Disclaimer Avertissement Opinions expressed remain those of the author and Les opinons exprimées n’engagent que leurs auteurs do not represent Department of National Defence or et ne reflètent aucunement des politiques du Canadian Forces policy. This paper may not be used Ministère de la Défense nationale ou des Forces without written permission. canadiennes. Ce papier ne peut être reproduit sans autorisation écrite. © Her Majesty the Queen in Right of Canada, as © Sa Majesté la Reine du Chef du Canada, représentée par represented by the Minister of National Defence, 2015. le ministre de la Défense nationale, 2015. CANADIAN FORCES COLLEGE – COLLÈGE DES FORCES CANADIENNES JCSP 41 – PCEMI 41 2014 – 2015 EXERCISE SOLO FLIGHT – EXERCICE SOLO FLIGHT THE CYBER ENTSCHEIDUNGSPROBLEM: OR WHY CYBER CAN’T BE SECURED AND WHAT MILITARY FORCES SHOULD DO ABOUT IT Maj F.J.A. Lauzier “This paper was written by a student “La présente étude a été rédigée par un attending the Canadian Forces College stagiaire du Collège des Forces in fulfilment of one of the requirements canadiennes pour satisfaire à l'une des of the Course of Studies. The paper is a exigences du cours. L'étude est un scholastic document, and thus contains document qui se rapporte au cours et facts and opinions, which the author contient donc des faits et des opinions alone considered appropriate and que seul l'auteur considère appropriés et correct for the subject. -
Division by Zero in Logic and Computing Jan Bergstra
Division by Zero in Logic and Computing Jan Bergstra To cite this version: Jan Bergstra. Division by Zero in Logic and Computing. 2021. hal-03184956v2 HAL Id: hal-03184956 https://hal.archives-ouvertes.fr/hal-03184956v2 Preprint submitted on 19 Apr 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. DIVISION BY ZERO IN LOGIC AND COMPUTING JAN A. BERGSTRA Abstract. The phenomenon of division by zero is considered from the per- spectives of logic and informatics respectively. Division rather than multi- plicative inverse is taken as the point of departure. A classification of views on division by zero is proposed: principled, physics based principled, quasi- principled, curiosity driven, pragmatic, and ad hoc. A survey is provided of different perspectives on the value of 1=0 with for each view an assessment view from the perspectives of logic and computing. No attempt is made to survey the long and diverse history of the subject. 1. Introduction In the context of rational numbers the constants 0 and 1 and the operations of addition ( + ) and subtraction ( − ) as well as multiplication ( · ) and division ( = ) play a key role. When starting with a binary primitive for subtraction unary opposite is an abbreviation as follows: −x = 0 − x, and given a two-place division function unary inverse is an abbreviation as follows: x−1 = 1=x. -
What Is Fuzzy Probability Theory?
Foundations of Physics, Vol.30,No. 10, 2000 What Is Fuzzy Probability Theory? S. Gudder1 Received March 4, 1998; revised July 6, 2000 The article begins with a discussion of sets and fuzzy sets. It is observed that iden- tifying a set with its indicator function makes it clear that a fuzzy set is a direct and natural generalization of a set. Making this identification also provides sim- plified proofs of various relationships between sets. Connectives for fuzzy sets that generalize those for sets are defined. The fundamentals of ordinary probability theory are reviewed and these ideas are used to motivate fuzzy probability theory. Observables (fuzzy random variables) and their distributions are defined. Some applications of fuzzy probability theory to quantum mechanics and computer science are briefly considered. 1. INTRODUCTION What do we mean by fuzzy probability theory? Isn't probability theory already fuzzy? That is, probability theory does not give precise answers but only probabilities. The imprecision in probability theory comes from our incomplete knowledge of the system but the random variables (measure- ments) still have precise values. For example, when we flip a coin we have only a partial knowledge about the physical structure of the coin and the initial conditions of the flip. If our knowledge about the coin were com- plete, we could predict exactly whether the coin lands heads or tails. However, we still assume that after the coin lands, we can tell precisely whether it is heads or tails. In fuzzy probability theory, we also have an imprecision in our measurements, and random variables must be replaced by fuzzy random variables and events by fuzzy events. -
Division by Zero: a Survey of Options
Division by Zero: A Survey of Options Jan A. Bergstra Informatics Institute, University of Amsterdam Science Park, 904, 1098 XH, Amsterdam, The Netherlands [email protected], [email protected] Submitted: 12 May 2019 Revised: 24 June 2019 Abstract The idea that, as opposed to the conventional viewpoint, division by zero may produce a meaningful result, is long standing and has attracted inter- est from many sides. We provide a survey of some options for defining an outcome for the application of division in case the second argument equals zero. The survey is limited by a combination of simplifying assumptions which are grouped together in the idea of a premeadow, which generalises the notion of an associative transfield. 1 Introduction The number of options available for assigning a meaning to the expression 1=0 is remarkably large. In order to provide an informative survey of such options some conditions may be imposed, thereby reducing the number of options. I will understand an option for division by zero as an arithmetical datatype, i.e. an algebra, with the following signature: • a single sort with name V , • constants 0 (zero) and 1 (one) for sort V , • 2-place functions · (multiplication) and + (addition), • unary functions − (additive inverse, also called opposite) and −1 (mul- tiplicative inverse), • 2 place functions − (subtraction) and = (division). Decimal notations like 2; 17; −8 are used as abbreviations, e.g. 2 = 1 + 1, and −3 = −((1 + 1) + 1). With inverse the multiplicative inverse is meant, while the additive inverse is referred to as opposite. 1 This signature is referred to as the signature of meadows ΣMd in [6], with the understanding that both inverse and division (and both opposite and sub- traction) are present. -
On Extensions of Partial Functions A.B
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Expo. Math. 25 (2007) 345–353 www.elsevier.de/exmath On extensions of partial functions A.B. Kharazishvilia,∗, A.P. Kirtadzeb aA. Razmadze Mathematical Institute, M. Alexidze Street, 1, Tbilisi 0193, Georgia bI. Vekua Institute of Applied Mathematics of Tbilisi State University, University Street, 2, Tbilisi 0143, Georgia Received 2 October 2006; received in revised form 15 January 2007 Abstract The problem of extending partial functions is considered from the general viewpoint. Some as- pects of this problem are illustrated by examples, which are concerned with typical real-valued partial functions (e.g. semicontinuous, monotone, additive, measurable, possessing the Baire property). ᭧ 2007 Elsevier GmbH. All rights reserved. MSC 2000: primary: 26A1526A21; 26A30; secondary: 28B20 Keywords: Partial function; Extension of a partial function; Semicontinuous function; Monotone function; Measurable function; Sierpi´nski–Zygmund function; Absolutely nonmeasurable function; Extension of a measure In this note we would like to consider several facts from mathematical analysis concerning extensions of real-valued partial functions. Some of those facts are rather easy and are accessible to average-level students. But some of them are much deeper, important and have applications in various branches of mathematics. The best known example of this type is the famous Tietze–Urysohn theorem, which states that every real-valued continuous function defined on a closed subset of a normal topological space can be extended to a real- valued continuous function defined on the whole space (see, for instance, [8], Chapter 1, Section 14). -
Be Measurable Spaces. a Func- 1 1 Tion F : E G Is Measurable If F − (A) E Whenever a G
2. Measurable functions and random variables 2.1. Measurable functions. Let (E; E) and (G; G) be measurable spaces. A func- 1 1 tion f : E G is measurable if f − (A) E whenever A G. Here f − (A) denotes the inverse!image of A by f 2 2 1 f − (A) = x E : f(x) A : f 2 2 g Usually G = R or G = [ ; ], in which case G is always taken to be the Borel σ-algebra. If E is a topological−∞ 1space and E = B(E), then a measurable function on E is called a Borel function. For any function f : E G, the inverse image preserves set operations ! 1 1 1 1 f − A = f − (A ); f − (G A) = E f − (A): i i n n i ! i [ [ 1 1 Therefore, the set f − (A) : A G is a σ-algebra on E and A G : f − (A) E is f 2 g 1 f ⊆ 2 g a σ-algebra on G. In particular, if G = σ(A) and f − (A) E whenever A A, then 1 2 2 A : f − (A) E is a σ-algebra containing A and hence G, so f is measurable. In the casef G = R, 2the gBorel σ-algebra is generated by intervals of the form ( ; y]; y R, so, to show that f : E R is Borel measurable, it suffices to show −∞that x 2E : f(x) y E for all y. ! f 2 ≤ g 2 1 If E is any topological space and f : E R is continuous, then f − (U) is open in E and hence measurable, whenever U is op!en in R; the open sets U generate B, so any continuous function is measurable.