Kolmogorov Complexity and the Incompressibility Method
|
|
|
- Dora Henry
- 10 years ago
- Views:
Transcription
1 Kolmogorov Complexity and the Incompressibility Method Holger Arnold 1. Introduction. What makes one object more complex than another? Kolmogorov complexity, or program-size complexity, provides one of many possible answers to this fundamental question. In this theory, whose foundations have been developed independently by R. J. Solomonoff [16 18], A. N. Kolmogorov [7, 8], and G. Chaitin [4] in the 1960s, the complexity of an object is defined as the length of its shortest effective description, which is the minimum number of symbols that must be specified such that the object can be reproduced from the specification by some abstract computing machine or formal system. The minimal length for an effective description of an object obviously depends on the exact method used for reproducing the object from the description. Since we want to measure the complexity of objects independently of any particular model of computation, we therefore define Kolmogorov complexity relative to a fixed (but unspecified) universal computable function. Then, using any model of computation, objects can be described at most a constant number of symbols shorter than their Kolmogorov complexity, where constant refers to a value that depends on the method for reproducing the objects but not on the described objects themselves. We can ignore these additive constants because we are typically interested in asymptotic complexities rather than in numeric complexity values. The notion of Kolmogorov complexity yields a simple yet powerful proof technique, called the incompressibility method. The purpose of this paper is to explain the concepts on which this technique is based and, along the way, to provide a concise introduction to Kolmogorov complexity theory. The only prerequisite is a basic understanding of computable functions; the employed notation is summarized in a short paragraph after the main text. The definitions and theorems in this paper are more or less standard; if not stated otherwise, they have been taken (with some modifications) from the book by Li and Vitányi [9], which is a comprehensive reference on Kolmogorov complexity theory and it applications. 2. Descriptions and complexity. First we need to make precise what we mean by a description of an object and its complexity. In the context of Kolmogorov complexity, an object is a finite string over some fixed finite alphabet. The complexity of more abstract objects, such as numbers or sets, can therefore only be measured relative to a particular encoding of these objects as strings. In this paper we assume that all strings are built Date: October 24, See for contact information. 1
2 from the symbols 0 and 1, but this assumption is not essential; all presented results hold similarly for strings over other alphabets. Definition 1. A description of a string x consists of a partial computable function ϕ and strings p and y such that ϕ(p, y) = x. Such a p is called a program for computing x by ϕ given y. The ϕ-complexity C ϕ of x relative to y is defined as C ϕ (x y) = min { l(p) p B and ϕ(p, y) = x } if there is a program p for computing x by ϕ given y, and as C ϕ (x y) = otherwise. This definition allows us to describe objects using any model of computation whose computational effects can be expressed by partial computable functions. Since the functions we are using in this paper are sufficiently simple, we will define them by equations comprising only constructs whose computability is self-evident. When the description of an object requires more complex functions, however, it is better to specify these functions using a particular model of computation. Up to additive constants, the notion of complexity introduced in Definition 1 is invariant with respect to the chosen description method, which is shown by the following theorem. Its proof relies on the existence of a universal partial computable function [13, 1.8], a fundamental result proved by A. Turing [19]: Theorem 2 (Invariance Theorem). There exists a partial computable function ϕ 0 such that C ϕ0 (x y) C ϕ (x y) + c ϕ for all partial computable functions ϕ and all strings x and y, where c ϕ is a nonnegative integer depending on ϕ but not on x or y. Proof. Let u be a universal partial computable function such that u(n, x) = ψ n (x) for all nonnegative integers n and all strings x, where ψ 0, ψ 1,... is an enumeration of the partial computable functions, and define ϕ 0 by ϕ 0 ( n, p, y) = u(n, p, y ) for all nonnegative integers n and all strings p and y. 1 Now let ϕ be any partial computable function; then ϕ = ψ n for some nonnegative integer n. If C ϕ (x y) < for strings x and y, then x = ϕ(p, y) = u(n, p, y ) = ϕ 0 ( n, p, y) for some string p with l(p) = C ϕ (x y). Hence C ϕ0 (x y) l( n, p ) = l(p) + 2l(n) + 1 = C ϕ (x y) + 2l(n) + 1 (a shorter encoding of n and p is possible, but this is not important here). A partial computable function with the property specified in Theorem 2 is called an additively optimal universal description function. The invariance theorem justifies choosing a fixed such function ϕ 0, which we will call the reference function, and defining Kolmogorov complexity relative to this function: 1 To simplify the definitions of partial computable functions, we implicitly assume that a function is undefined for arguments not matching any of the given definitions. For example, the function ϕ 0 in the proof of Theorem 2 is undefined if its argument does not have the form u, v, w for strings u, v, and w. 2
3 Definition 3. Let ϕ 0 be a fixed additively optimal universal description function such that C ϕ0 (x y) > 0 for all strings x and y. 2 Then, for all strings x and y, the ϕ 0 -complexity C ϕ0 (x y) is called the Kolmogorov complexity of x relative to y, denoted by C(x y), and C(x ɛ) is called the Kolmogorov complexity of x, denoted by C(x). This is the classical definition of Kolmogorov complexity. There are other complexity measures that are superior to this definition in some respects. In particular, if we require that no valid program should be a prefix of another valid program, we get a complexity measure, called prefix complexity, that has a number of theoretical advantages over the classical definition. In G. Chaitin s opinion, the original definition of Kolmogorov complexity is therefore only of historical or pedagogic interest [3, Foreword]. On the other hand, the classical definition is often easier to use in calculations because it admits a simple, computable upper bound on the complexity of a string, namely its length plus a constant (Lemma 4), whereas the corresponding upper bound on the prefix complexity of a string necessarily involves the complexity of the string s length. It is easy to show that Kolmogorov complexity is not computable: if C were a partial computable function, then, by applying Kleene s recursion theorem [13, 11.2], we could construct a program of length n producing a string of complexity greater than n a contradiction resembling Berry s paradox of the least integer not nameable in fewer than nineteen syllables [14]. Nevertheless, the Kolmogorov complexity function can be effectively approximated from above using dovetailing. Since it implicitly depends on the chosen reference function and there are infinitely many additively optimal universal description functions Kolmogorov complexity is not an absolute notion of complexity for individual strings. In fact, by choosing a suitable reference function, we can assign nearly arbitrary complexity values to any finite subset of strings. By the invariance theorem, however, the effect of such distortions of the complexity function diminishes with increasing complexity, as Kolmogorov already observed: It is true, as we have already noted, that such an individual quantitative estimate of information is meaningful only when the quantity of information is sufficiently large (Kolmogorov identified complexity with information) [8, Section 3]. Therefore, to obtain results that are independent of the chosen reference function, we have to analyze not the complexity of individual strings but the asymptotic complexity of infinite families of strings of increasing size. 3. Complexity upper bounds. By the invariance theorem (Theorem 2), every program for computing a string by some partial computable function implies an upper bound on the complexity of the string. We can use this fact to derive a number of simple but important upper bounds. Lemma 4. There is a nonnegative integer c such that C(x) l(x) + c for all strings x. 2 This assumption is only made to simplify some calculations involving logarithms of complexities. 3
4 Proof. Let f be the partial computable function defined by f(x, y) = x for all strings x and y. Then, by Theorem 2, there is a nonnegative integer c such that C(x) C f (x)+c = l(x) + c for all strings x. Lemma 5. Let t be a computable function. Then there is a nonnegative integer c t such that C(t(x) y) C(x y) + c t for all strings x and y. Proof. Let f be the partial computable function defined by f(p, y) = t(ϕ 0 (p, y)) for all strings p and y. Then every program p for computing x by ϕ 0 given y is also a program for computing t(x) by f given y. Hence, by Theorem 2, there is a nonnegative integer c t such that C(t(x) y) C f (t(x) y) + c t C ϕ0 (x y) + c t = C(x y) + c t. Lemma 6. Let t be a computable function. Then there is a nonnegative integer c t such that C(x y) C(x t(y)) + c t for all strings x and y. Proof. Let f be the partial computable function defined by f(p, y) = ϕ 0 (p, t(y)) for all strings p and y. Then every program p for computing x by ϕ 0 given t(y) is also a program for computing x by f given y. Hence, by Theorem 2, there is a nonnegative integer c t such that C(x y) C f (x y) + c t C ϕ0 (x t(y)) + c t = C(x t(y)) + c t. Lemma 6 implies that there is a nonnegative integer c such that C(x y) C(x) + c for all strings x and y (let t to be the constant function ɛ), and that for every string y, there is a nonnegative integer c y such that C(x) C(x y) + c y for all strings x (let t be a computable function mapping ɛ to y). Lemma 7. There is a nonnegative integer c such that C( x, y ) C(x) + C(y) + 2 log min {C(x), C(y)} + c for all strings x and y. Proof. Let f be the partial computable function defined, for all strings p, q, and z, by f(l(p)pq, z) = ϕ 0 (p, ɛ), ϕ 0 (q, ɛ). Then, for every program p for computing x by ϕ 0 and every program q for computing y by ϕ 0, the string l(p)pq is a program for computing x, y by f, with l(l(p)pq) = l(p) + l(q) + 2 log (l(p) + 1) + 1 l(p) + l(q) + 2 log l(p) + 2. Hence, by Theorem 2, there is a nonnegative integer c such that C( x, y ) C f ( x, y ) + c C(x) + C(y) + 2 log C(x) + c + 2 for all strings x and y. The lemma then follows by reasoning analogously for the function g defined, for all strings p, q, and z, by g(l(p)pq, z) = ϕ 0 (q, ɛ), ϕ 0 (p, ɛ). For every injective pairing function p, it can be shown that there is a nonnegative integer c p such that, for all nonnegative integers n, there are strings x and y of length at most n with C(p(x, y)) C(x) + C(y) + log n c p. 3 Thus, the logarithmic term in the bound of Lemma 7 can not be eliminated by choosing a different encoding of pairs. 3 See the discussion of Examples and in Li and Vitányi [9]. 4
5 4. Incompressible strings and randomness. A string is called compressible if it has a description which is shorter than the string itself. It is clear that some strings can be compressed by large amounts; in fact, the ratio of string length to string complexity can grow as fast as any computable function. For the development of Kolmogorov complexity theory, however, the interesting objects are the strings that can not be compressed: Definition 8. A string x is called k-incompressible for some nonnegative integer k if C(x) l(x) k. A 0-incompressible string is called incompressible. Incompressible strings lack regularities that could be exploited to obtain a compressed description for them; they are effectively patternless. It seems reasonable to call such strings random, at least insofar as this term is meaningful for finite objects. The intuitive correspondence between incompressibility and randomness is supported by a formal argument: an effective randomness test, as defined in Per Martin-Löf s theory of randomness [10], cannot distinguish incompressible strings from truly random strings if their length exceeds a constant depending on the test; in other words, all incompressible strings whose length is greater than this constant pass the test. The following lemma provides a lower bound on the number of k-incompressible strings of a given length. It generalizes a bound that Buhrman et al. [2, Lemma 2] have proved for the case k = 0. In particular, the lemma shows that, as k increases, the frequency of k-incompressible strings in the set of all strings of length n converges rapidly to 1: Lemma 9 (Incompressibility Lemma). There is a real number d with 0 d < 1 and a nonnegative integer c such that, for all nonnegative integers k, all integers n k + c, and all strings y, there are at least 2 n (1 2 k d) strings x of length n with C(x y) n k. Proof. By Lemmas 4 and 6, there is a nonnegative integer c such that C(x y) l(x) c for all strings x and y. This means that, for all nonnegative integers n and k with n k + c and all strings y, at least 2 n k c 1 strings of length less than n k are programs for computing, by ϕ 0 and given y, strings of length less than n k. Therefore at most 2 n k 2 n k c strings of length less than n k are programs for computing strings of length at least n. Hence there are at least 2 n (1 2 k (1 2 c )) strings x of length n with C(x y) n k. Although Lemma 9 shows that, already for small values of k, nearly all strings of every length are k-incompressible, it is impossible to prove the incompressibility of any particular string, except for very short ones. This is a consequence of a theorem proved by Chaitin [5], which states that there is a constant c such that no sound formal system of complexity n can prove that any particular string is of complexity greater than n + c. Although this theorem, which is known as Chaitin s incompleteness theorem, has similar implications as Gödel s first incompleteness theorem [6], its philosophical relevance has 5
6 occasionally been overrated by Chaitin himself and others; see van Lambalgen [20] and Raatikainen [12] for a critical discussion of some of Chaitin s arguments. 5. Complexity of strings in finite sets. In many applications of Kolmogorov complexity, objects are not considered in isolation but as members of certain finite sets, which requires a way of encoding finite sets of strings as strings. For this purpose, we call a surjective function σ mapping strings to finite subsets of B a representation scheme for finite sets of strings if, for all finite sets A of strings, membership in A and the number of elements in A are computable from any string x with σ(x) = A. For example, we can define σ so that it maps every string x to the subset of B whose characteristic sequence, when generated from the shortlex order on B, is x Given a representation scheme σ, we will refer to every string x with σ(x) = A as a representation of the set A. In the following sections, σ denotes any representation scheme for finite sets of strings; we must keep in mind, however, that the derived results depend quantitatively on the chosen scheme. The elements of a finite set of strings can be computed from a representation of the set and their index relative to some linear order on the set elements. Thus, their complexity relative to any representation of the set is bounded from above by the logarithm of the set s cardinality plus a constant: Lemma 10. There is a nonnegative integer c such that C(x y) log A + c for all finite sets A of strings, all representations y of A, and all x A. Proof. Let f be the partial computable function defined by f(i, y) = x i for all strings y and all nonnegative integers i σ(y), where x i is the i-th element of the set σ(y) relative to some computable linear order on B. The elements of σ(y) are computable because σ is a representation scheme. Then, by Theorem 2, there is a constant c such that C(x y) C f (x y) + c log A + c for all finite sets A of strings, all representations y of A, and all x A. In Section 4 we used the length of a string as a natural upper bound on its complexity, from which we derived the notion of k-incompressibility. Similarly, we can use log n as a natural upper bound on the complexity of strings contained in a finite set of n strings, relative to a representation of the set: Definition 11. Let y be a string, and let A = σ(y). Then a string x A is called k-incompressible relative to y for some nonnegative integer k if C(x y) log A k. The following lemma, which is also called incompressibility lemma, provides a lower bound on the number of k-incompressible strings in any finite set of strings. Note that, without making assumptions about the strings in the set, the best we can do is to simply 4 This representation scheme is used by Li and Vitányi [9] (Exercise: Find this definition in their book). 6
7 count all potential programs. As a result, the bound in this lemma is weaker than the bound in Lemma 9: Lemma 12 (Incompressibility Lemma). Let A be a finite set of strings. Then, for all nonnegative integers k log A and all strings y, the set A contains at least (1 2 k ) A +1 strings x with C(x y) log A k. Proof. There are 0 i k 1 2i = 2 k 1 strings of length less than k. Hence A contains at most 2 k A 1 strings of complexity less than log A k. The second incompressibility lemma shows that most strings in any finite set of strings cannot be described much shorter than by their index in the set. In other words, a typical element of a finite set of strings has close to maximal complexity relative to the set. We can quantify the degree of typicality of a string relative to a finite set of strings by considering the distance of the string s complexity, relative to a representation of the set, to the maximal complexity for elements of the set: Definition 13. Let y be a string, and let A = σ(y). Then, for all strings x, the randomness deficiency δ(x y) of x relative to y is defined as δ(x y) = log A C(x y) if x A, and as δ(x y) = if x / A. By Lemma 10, there is a nonnegative integer c such that δ(x y) > c for all strings x and y, and from Lemma 12, it follows immediately that any finite set A of strings with representation y contains at most 2 k A 1 strings x with δ(x y) > k, for all nonnegative integers k log A. 6. The incompressibility method. The main result that we derived from the concepts introduced in the preceding sections is that, in every finite set of strings, only very few elements can be compressed by large amounts. That this result can be exploited in a proof has been shown first by W. Paul [11], who proved a new lower bound on the running time of sorting algorithms on multi-tape Turing machines. Since then, arguments using the properties of incompressible strings have found many applications; in particular, they have been used to prove lower bounds on the time complexity of computational problems, to characterize the average-case behavior of algorithms, and to prove the existence or high probability of combinatorial objects with certain properties. See Li and Vitányi s book [9] for a survey of many of these applications, including extensive references to original research in this field. The name incompressibility method subsumes different proof techniques that are based on the properties of incompressible strings. In this paper we consider only one such technique: the replacement of probabilistic arguments for proving the existence of combinatorial objects with certain properties. Using the probabilistic method [1], we can prove that a given domain contains an object with a given property by showing that an object chosen randomly from the domain has this property with positive probability. 7
8 Since we know from Lemmas 9 and 12 that every domain contains incompressible objects, we can replace such a probabilistic existence argument by a non-probabilistic one if we can show that every incompressible object in the domain has the desired property, and the usual way to show this is to demonstrate that every object that does not have this property can be compressed. Proofs based on incompressibility arguments are often simpler than proofs based on purely probabilistic arguments. One reason for this apparent simplicity is that when using incompressibility arguments, reasoning can be confined to a well-defined subset of objects the incompressible elements in a domain. In contrast, when using probabilistic arguments, it is necessary to consider a whole distribution of objects. Moreover, since, frequently, the very definition of a property already indicates a method for compressing objects that do not have this property, incompressibility arguments are usually very intuitive. For finite domains (and infinite families of finite domains) and computable properties, incompressibility arguments and probabilistic arguments are equivalent in the following sense: If all elements with sufficiently small randomness deficiency have a given property, then elements chosen randomly according to the uniform distribution have this property with high probability. 5 Conversely, elements with sufficiently small randomness deficiency share all properties that randomly chosen elements have with high probability. The following theorem makes these statements precise: Lemma 14. Let A be a finite set of strings, and let y be a representation of A. Let d be an integer such that d log A. Let P be a computable predicate. 1. If all strings x A with δ(x y) d satisfy P, then at least (1 2 d ) A + 1 strings in A satisfy P. 2. There is a nonnegative integer c P, not depending on A, such that, if at least (1 2 d ) A strings in A satisfy P, then all x A with δ(x y) < d c P satisfy P. Proof. First, assume that all strings x A with δ(x y) d satisfy P. Then, by Lemma 12, { x A P (x) } { x A δ(x y) d } (1 2 d ) A + 1. To prove the second statement, assume that at least (1 2 d ) A strings in A satisfy P. Let f be the function defined by σ(f(x)) = { x σ(x) P (x) } for all strings x. This function is computable because σ is a representation scheme and P is a computable predicate. Hence, by Lemma 6, there is a nonnegative integer c f, depending on f (and thus on P ) but not on A, such that C(x y) C(x f(y)) + c f for all strings x. Let B = σ(f(y)) = { x A P (x) }. Then, by Lemma 10, there is a nonnegative integer c, not depending on A, B, or P, such that C(x f(y)) log B + c log 2 d A + c 5 Similar results can be obtained for more general classes of distributions, but it is necessary to preclude distributions that are too unbalanced in the sense that they assign the greatest part of the probability mass to the few highly compressible objects. 8
9 log A d + c for all x B. Hence δ(x y) d c f c for all x A that do not satisfy P. Acknowledgment. I wish to thank Christoph Kreitz and Tim Richter for their comments on the first draft of this paper. Notation. N denotes the set of nonnegative integers, B the set {0, 1}, B n the set of binary strings of length n, and B the set of finite binary strings. The term string implicitly refers to a finite binary string. For a string x, l(x) denotes its length, and x = 0 l(x) 1x denotes a self-delimiting encoding of x with l(x) = 2l(x) + 1. String concatenation is denoted by juxtaposition. We identify binary strings and nonnegative integers by mapping strings bijectively to their index in B with respect to the shortlex order 6, starting with the empty string ɛ, which is mapped to 0. For a nonnegative integer n, l(n) = log(n+1) denotes the length of its representation as a binary string; log n denotes the binary logarithm of n. If not stated otherwise, constants are nonnegative integers. S denotes the cardinality of the set S. Partial computable functions map binary strings to binary strings. We use the term computable function to refer to an everywhere defined partial computable function. A computable predicate is a computable function with range {0, 1}, where 0 corresponds to the value false and 1 corresponds to the value true. For all positive integers n, n denotes the injective map from (B ) n to B defined by x = x, x 1, x 2 = x 1 x 2, and x 1,..., x n = x 1, x 2,..., x n for n > 2 (we omit the upper index when the number of arguments is clear). For all partial computable functions ϕ, we define ϕ(x 1,..., x n ) = ϕ( x 1,..., x n ). References 1. Noga Alon and Joel H. Spencer. The Probabilistic Method. Wiley-Interscience, second edition, Harry Buhrman, Tao Jiang, Ming Li, and Paul Vitányi. New applications of the incompressibility method: Part II. Theoretical Computer Science, 235(1):59 70, Cristian Calude. Information and Randomness: An Algorithmic Perspective. Springer, Gregory J. Chaitin. On the length of programs for computing finite binary sequences. Journal of the ACM, 13(4): , If denotes the shortlex order on B, then x y if either l(x) < l(y) or l(x) = l(y) and x is lexicographically smaller than y. This order is also called the length-plus-lexicographic order [15] 9
10 5. Gregory J. Chaitin. Information-theoretic limitations of formal systems. Journal of the ACM, 21(3): , Kurt Gödel. Über formal unentscheidbare Sätze der Principia mathematica und verwandter Systeme I. Monatshefte für Mathematik und Physik, 38: , A. N. Kolmogorov. On tables of random numbers. Sankhyā: The Indian Journal of Statistics, Series A, 70(4): , A. N. Kolmogorov. Three approaches to the quantitative definition of information. Problems of Information Transmission, 1(1):1 7, Ming Li and Paul Vitányi. An Introduction to Kolmogorov Complexity and Its Applications. Springer, third edition, Per Martin-Löf. The definition of random sequences. Information and Control, 9(6): , Wolfgang J. Paul. Kolmogorov complexity and lower bounds. In Lothar Budach, editor, Proceedings of the 1979 International Conference on Fundamentals of Computation Theory, pages Akademie-Verlag, Panu Raatikainen. On interpreting Chaitin s incompleteness theorem. Journal of Philosophic Logic, 27(6): , Hartley Rogers, Jr. Theory of Recursive Functions and Effective Computability. McGraw-Hill, Reprinted, MIT Press, Bertrand Russell. Mathematical logic as based on the theory of types. American Journal of Mathematics, 30(3): , Charles C. Sims. Computation with Finitely Presented Groups, volume 48 of Encyclopedia of Mathematics and its Applications. Cambridge University Press, R. J. Solomonoff. A preliminary report on a general theory of inductive inference. Technical Report ZTB-138, Zator Company, November Ray J. Solomonoff. A formal theory of inductive inference, part I. Information and Control, 7(1):1 22, Ray J. Solomonoff. A formal theory of inductive inference, part II. Information and Control, 7(2): , A. M. Turing. On computable numbers, with an application to the Entscheidungsproblem. Proceedings of the London Mathematical Society, Series 2, 42: ,
11 20. Michiel van Lambalgen. Algorithmic information theory. Journal of Symbolic Logic, 54(4): ,
An example of a computable
An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Low upper bound of ideals, coding into rich Π 0 1 classes
Low upper bound of ideals, coding into rich Π 0 1 classes Antonín Kučera the main part is a joint project with T. Slaman Charles University, Prague September 2007, Chicago The main result There is a low
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
Degrees that are not degrees of categoricity
Degrees that are not degrees of categoricity Bernard A. Anderson Department of Mathematics and Physical Sciences Gordon State College [email protected] www.gordonstate.edu/faculty/banderson Barbara
Notes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
INTRODUCTORY SET THEORY
M.Sc. program in mathematics INTRODUCTORY SET THEORY Katalin Károlyi Department of Applied Analysis, Eötvös Loránd University H-1088 Budapest, Múzeum krt. 6-8. CONTENTS 1. SETS Set, equal sets, subset,
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
MA651 Topology. Lecture 6. Separation Axioms.
MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
Turing Machines and Understanding Computational Complexity
Turing Machines and Understanding Computational Complexity Paul M.B.Vitányi CWI, Science Park 123, 1098XG Amsterdam The Netherlands 1. Introduction A Turing machine refers to a hypothetical machine proposed
Local periods and binary partial words: An algorithm
Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:
GENERIC COMPUTABILITY, TURING DEGREES, AND ASYMPTOTIC DENSITY
GENERIC COMPUTABILITY, TURING DEGREES, AND ASYMPTOTIC DENSITY CARL G. JOCKUSCH, JR. AND PAUL E. SCHUPP Abstract. Generic decidability has been extensively studied in group theory, and we now study it in
THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER
THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER JASPER DEANTONIO Abstract. This paper is a study of the Turing Degrees, which are levels of incomputability naturally arising from sets of natural numbers.
Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson
Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement
Integrating Benders decomposition within Constraint Programming
Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP
Computability Theory
CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Computability Theory This section is partly inspired by the material in A Course in Mathematical Logic by Bell and Machover, Chap 6, sections 1-10.
Reading 13 : Finite State Automata and Regular Expressions
CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
Online and Offline Selling in Limit Order Markets
Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. [email protected] 2 Yale University [email protected] Abstract. Completely automated electronic
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
On strong fairness in UNITY
On strong fairness in UNITY H.P.Gumm, D.Zhukov Fachbereich Mathematik und Informatik Philipps Universität Marburg {gumm,shukov}@mathematik.uni-marburg.de Abstract. In [6] Tsay and Bagrodia present a correct
A Catalogue of the Steiner Triple Systems of Order 19
A Catalogue of the Steiner Triple Systems of Order 19 Petteri Kaski 1, Patric R. J. Östergård 2, Olli Pottonen 2, and Lasse Kiviluoto 3 1 Helsinki Institute for Information Technology HIIT University of
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
BANACH AND HILBERT SPACE REVIEW
BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but
Introduction to Theory of Computation
Introduction to Theory of Computation Prof. (Dr.) K.R. Chowdhary Email: [email protected] Formerly at department of Computer Science and Engineering MBM Engineering College, Jodhpur Tuesday 28 th
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
The Ergodic Theorem and randomness
The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction
No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
On the Structure of Turing Universe: The Non-Linear Ordering of Turing Degrees
On the Structure of Turing Universe: The Non-Linear Ordering of Turing Degrees Yazan Boshmaf November 22, 2010 Abstract Turing Universe: the final frontier. These are the voyages of five mathematicians.
CONTRIBUTIONS TO ZERO SUM PROBLEMS
CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg
This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.
3. Axioms of Set theory Before presenting the axioms of set theory, we first make a few basic comments about the relevant first order logic. We will give a somewhat more detailed discussion later, but
THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES
THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES ANDREW E.M. LEWIS 1. Introduction This will be a course on the Turing degrees. We shall assume very little background knowledge: familiarity with
WE write string to mean a finite binary string. Other. Information Distance
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 4, JULY 1998 1407 Information Distance Charles H. Bennett, Péter Gács, Senior Member, IEEE, Ming Li, Paul M. B. Vitányi, and Wojciech H. Zurek Abstract
This chapter is all about cardinality of sets. At first this looks like a
CHAPTER Cardinality of Sets This chapter is all about cardinality of sets At first this looks like a very simple concept To find the cardinality of a set, just count its elements If A = { a, b, c, d },
The Banach-Tarski Paradox
University of Oslo MAT2 Project The Banach-Tarski Paradox Author: Fredrik Meyer Supervisor: Nadia S. Larsen Abstract In its weak form, the Banach-Tarski paradox states that for any ball in R, it is possible
MODELING RANDOMNESS IN NETWORK TRAFFIC
MODELING RANDOMNESS IN NETWORK TRAFFIC - LAVANYA JOSE, INDEPENDENT WORK FALL 11 ADVISED BY PROF. MOSES CHARIKAR ABSTRACT. Sketches are randomized data structures that allow one to record properties of
Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011
Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 A. Miller 1. Introduction. The definitions of metric space and topological space were developed in the early 1900 s, largely
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,
The Halting Problem is Undecidable
185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine
ON INITIAL SEGMENT COMPLEXITY AND DEGREES OF RANDOMNESS
ON INITIAL SEGMENT COMPLEXITY AND DEGREES OF RANDOMNESS JOSEPH S. MILLER AND LIANG YU Abstract. One approach to understanding the fine structure of initial segment complexity was introduced by Downey,
Automata and Formal Languages
Automata and Formal Languages Winter 2009-2010 Yacov Hel-Or 1 What this course is all about This course is about mathematical models of computation We ll study different machine models (finite automata,
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
Hypercomputation: computing more than the Turing machine
Hypercomputation: computing more than the Turing machine Abstract: Toby Ord Department of Philosophy * The University of Melbourne [email protected] In this report I provide an introduction to
8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly
Lecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
(LMCS, p. 317) V.1. First Order Logic. This is the most powerful, most expressive logic that we will examine.
(LMCS, p. 317) V.1 First Order Logic This is the most powerful, most expressive logic that we will examine. Our version of first-order logic will use the following symbols: variables connectives (,,,,
Mathematical Induction. Lecture 10-11
Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
How To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl)
Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
You know from calculus that functions play a fundamental role in mathematics.
CHPTER 12 Functions You know from calculus that functions play a fundamental role in mathematics. You likely view a function as a kind of formula that describes a relationship between two (or more) quantities.
Optimization Is Easy and Learning Is Hard In the Typical Function
Optimization Is Easy and Learning Is Hard In the Typical Function Thomas M. English The Tom English Project 2401 45th Street #30 Lubbock, Texas 79412 USA [email protected] Abstract-Elementary results
Cardinality. The set of all finite strings over the alphabet of lowercase letters is countable. The set of real numbers R is an uncountable set.
Section 2.5 Cardinality (another) Definition: The cardinality of a set A is equal to the cardinality of a set B, denoted A = B, if and only if there is a bijection from A to B. If there is an injection
The degree, size and chromatic index of a uniform hypergraph
The degree, size and chromatic index of a uniform hypergraph Noga Alon Jeong Han Kim Abstract Let H be a k-uniform hypergraph in which no two edges share more than t common vertices, and let D denote the
Computation Beyond Turing Machines
Computation Beyond Turing Machines Peter Wegner, Brown University Dina Goldin, U. of Connecticut 1. Turing s legacy Alan Turing was a brilliant mathematician who showed that computers could not completely
Lecture 16 : Relations and Functions DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence
Chapter 7 Uncomputability
Chapter 7 Uncomputability 190 7.1 Introduction Undecidability of concrete problems. First undecidable problem obtained by diagonalisation. Other undecidable problems obtained by means of the reduction
Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005
Turing Degrees and Definability of the Jump Theodore A. Slaman University of California, Berkeley CJuly, 2005 Outline Lecture 1 Forcing in arithmetic Coding and decoding theorems Automorphisms of countable
Follow links for Class Use and other Permissions. For more information send email to: [email protected]
COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part
THE DEGREES OF BI-HYPERHYPERIMMUNE SETS
THE DEGREES OF BI-HYPERHYPERIMMUNE SETS URI ANDREWS, PETER GERDES, AND JOSEPH S. MILLER Abstract. We study the degrees of bi-hyperhyperimmune (bi-hhi) sets. Our main result characterizes these degrees
(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.
3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem
24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety
1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
The Relative Worst Order Ratio for On-Line Algorithms
The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, [email protected]
Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi
Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the
How To Understand The Theory Of Computer Science
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
On an anti-ramsey type result
On an anti-ramsey type result Noga Alon, Hanno Lefmann and Vojtĕch Rödl Abstract We consider anti-ramsey type results. For a given coloring of the k-element subsets of an n-element set X, where two k-element
MATHEMATICS OF FINANCE AND INVESTMENT
MATHEMATICS OF FINANCE AND INVESTMENT G. I. FALIN Department of Probability Theory Faculty of Mechanics & Mathematics Moscow State Lomonosov University Moscow 119992 [email protected] 2 G.I.Falin. Mathematics
Computing divisors and common multiples of quasi-linear ordinary differential equations
Computing divisors and common multiples of quasi-linear ordinary differential equations Dima Grigoriev CNRS, Mathématiques, Université de Lille Villeneuve d Ascq, 59655, France [email protected]
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand
Notes V General Equilibrium: Positive Theory In this lecture we go on considering a general equilibrium model of a private ownership economy. In contrast to the Notes IV, we focus on positive issues such
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
Set Theory Basic Concepts and Definitions
Set Theory Basic Concepts and Definitions The Importance of Set Theory One striking feature of humans is their inherent need and ability to group objects according to specific criteria. Our prehistoric
SMALL SKEW FIELDS CÉDRIC MILLIET
SMALL SKEW FIELDS CÉDRIC MILLIET Abstract A division ring of positive characteristic with countably many pure types is a field Wedderburn showed in 1905 that finite fields are commutative As for infinite
Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,
3. INNER PRODUCT SPACES
. INNER PRODUCT SPACES.. Definition So far we have studied abstract vector spaces. These are a generalisation of the geometric spaces R and R. But these have more structure than just that of a vector space.
