Révision 224

CSL17/completeness.tex (revision 224)
6 6
	\label{thm:completeness}
7 7
	For every $\mubci{i-1}$ program $f(\vec u ; \vec x)$ (which is in $\fphi i$), there is a $\Sigma^{\safe}_i$ formula $A_f(\vec u, \vec x)$ such that $\arith^i$ proves $\forall^{\normal} \vec u, \forall^{\safe} \vec x, \exists^{\safe} ! y. A_f(\vec u , \vec x , y )$ and $\Nat \models \forall \vec u , \vec x. A_f(\vec u , \vec x , f(\vec u ; \vec x))$.
8 8
\end{theorem}
9
\begin{proof}[Sketch](A more detailed proof can be found in Appendix \ref{appendix:completeness})
9 10

  
10
\todo{Add proof sketch. Cut and paste main proof to appendix.}
11
 The proof proceeds by induction on the construction of $\mubci{i-1}$ program $f(\vec u ; \vec x)$ to construct a suitable formula $A_f(\vec u, \vec x)$ .  The case of initial functions is easy, by using the formulas we gave in Sect. \ref{sect:graphsbasicfunctions}. The case of safe composition is also simple, and makes use of the $\rais$ rule. The two key cases are thus those of predicative recursion and predicative minimisation. 
12
 
13
 For predicative recursion, the basic idea is to follow the classical simulation of primitive recursion in arithmetic, adapted to recursion on notation, by encoding the sequence of recursive calls as an integer $w$. The main technical difficulty is to have a decoding predicate $\beta (k, w, y)$ (the $k$th element of the sequence represented by $w$ is $y$) which is sorted in a suitable way so that the formula $A_f$  is in the same class $\Sigma^{\safe}_i$ as $A_g$,  $A_{h_0}$ and $A_{h_1}$.  This can be obtained by defining  the predicate $\beta (k, w, y)$ with $k$ in $\normal$ and $w$, $y$ in $\safe$.
11 14

  
15
 
16
 For predicative minimisation finally, assume $f$ is defined by  $\mu x^{+1} . g(\vec u ; \vec x , x) =_2 0$. By induction hypothesis we have a $\Sigma^{\safe}_{i-1}$ formula $A_g (\vec u , \vec x , x , y)$  satisfying the property. We then define $A_f(\vec u ; \vec x , z)$ as the following $\Sigma^{\safe}_{i}$ formula:
17
\[
18
\begin{array}{rl}
19
&\left(
20
z=0 \  \cand \ \forall x^\safe , y^\safe . (A_g (\vec u , \vec x , x, y) \cimp y=_2 1)
21
\right) \\
22
\cor & \left(
23
\begin{array}{ll}
24
z\neq 0 
25
& \cand\   \forall y^\safe . (A_g (\vec u , \vec x , p z , y) \cimp y=_2 0 ) \\
26
& \cand\ \forall x^\safe < p z . \forall y^\safe . (A_g (\vec u , \vec x , x , y) \cimp y=_2 1) 
27
\end{array}
28
\right)
29
\end{array}
30
\]
31
As in the bounded arithmetic $S_2$ (\cite{Buss86book}, Thm 20, p. 58),  $\arith^i$ can prove a minimisation principle for $\cmin{\Sigma^\safe_{i-1}}$ formulas, which we apply to the formula  $\exists x^\safe , y^\safe .  (A_g (\vec u ,\vec x , x , y) \cand y=_2 0)$. From that we can prove the totality of $A_f(\vec u ; \vec x , z)$ as required.
12 32

  
33
\end{proof}
13 34

  
14 35

  
15 36

  
......
30 51

  
31 52

  
32 53

  
54

  
CSL17/preliminaries.tex (revision 224)
234 234
  If $\Phi$ is a class of polymax bounded polynomial checking functions, then  $\mubc(\Phi)$ satisfies the properties of Thm \ref{thm:mubc}.
235 235
 \end{proposition}
236 236
 
237
 \subsection{Some properties and extensions of $\bc$ and $\mubc$}
237
 \subsection{Some properties and extensions of $\bc$ and $\mubc$}\label{sect:somepropertiesofmubc}
238 238
 
239 239
 \anupam{done a pass up to here. Resuming at next section.}
240 240
 
CSL17/appendix-completeness.tex (revision 224)
1
\section{Proof of completeness}
1
\section{Proof of completeness}\label{appendix:completeness}
2 2

  
3 3
The rest of this section is devoted to a proof of this theorem.
4 4
We proceed by structural induction on a $\mubc^{i-1} $ program, dealing with each case in the proceeding paragraphs.

Formats disponibles : Unified diff