root / CSL17 / sequence-coding.tex @ 165
Historique | Voir | Annoter | Télécharger (2,04 ko)
1 |
\section{A safe encoding of sequences and computations} |
---|---|
2 |
|
3 |
Before we can prove the completeness result for our theory, we need to address an apparent problem with usual first-order encodings of computations. |
4 |
Recalling the polychecking lemma, we notice that for usual encodings of sequences of natural numbers it is not possible to `decode' sequences as a safe input. |
5 |
Otherwise phrased, we would like to implement G\"odel's beta functions with the sorting $\beta (i;x)$, returning the $i$th element of the sequence encoded by $x$. |
6 |
However, for $x$ to be safe here, we must only require $\poly (i)$ rightmost bits of $x$ to determine a finite number of rightmost bits of $\beta(i;x)$. |
7 |
If $x$ is construed as a concatenation of its elements, with distinguished delimiters, or similarly, accessing the $i$th element cannot have this property since we do not have any information about previously occurring elements, which may be very large. |
8 |
|
9 |
In bounded arithmetic this problem is avoided due to the fact that we know in advance that computations can be polynomially bounded both in length and size of elements, since we are in PH by Parikh's theorem. |
10 |
Due to the polymax bounded property we actually have a similar situation here, although we would naturally prefer to avoid introducing explicit bounds, favouring that all complexity control is managed by safety and normality of arguments. |
11 |
|
12 |
The answer is to use a slightly modified encoding of sequences, based on a simple (and well known) idea. |
13 |
For the sake of example, if we wanted to simply pair two arguments safely, we could just interleave their bits and satisfy the polychecking lemma, regardless of the size of the two arguments. |
14 |
This is naturally scalable to any $k$-tuple of arguments, all safe. |
15 |
|
16 |
For an arbitrary sequence we cannot use quite the same technique since length is not determined in advance. |
17 |
However, by using a slightly more asymmetric encoding we can still access all required bits in quadratic modulus rather than linear, appealing to a `zig-zag' technique. |
18 |
|
19 |
\anupam{Every number is an infinite ultimately 0 sequence.} |