This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!
. Then (do, rp) is a factorization of p, which we call the canonical factorization of p. Note that do is primitive recursive, and rp is primitive recursive in p. EXAMPLE
14.5 Let do be as in the preceding example. I f f is a total unary function 5 f ( + ) holds for all I , and p is a total unary function, we set r & ( z )=
.Clearly, (do, rb) is a factorization of /3. Here r& is primitive recursive in p and f .
EXAMPLE
such that
2:
EXAMPLE
14.6 Let
p be
a total function. we set d p ( z , y )
N
p ( y ) if y
5
I,
and
d p ( z , y ) N 0 otherwise. If r ( z ) = z,then ( d p , r ) is a factorization of /3.
Let d be a total binary function, r and p total unary functions. I f f is a (0, 1)-ary functional we introduce the unary function f,j,,.(z) N f ( ( X y ) d ( r ( z ) , y ) ) .If f(P) is defined, ( d , r ) is a factorization of /3, and fd,,.(z) $ f ( P ) for all 2, we say that ( d , r ) is a deflector f o r f at p. 14.7 Let /3 be a total function such that p ( z ) $ 0 for all I . Then (do, r p ) is a deflector for the functional E at p. On the other hand, if p is a function such that ( p z ) p ( c ) is defined, then (do, rp) is not a deflector for E at p. In fact, in this case there is no possible deflector for E at p. EXAMPLE
Theorem 14.7 Let f be a ( 0 , 1)-ary functional and assume ( d , r ) is a deflector for f at p. Then
(i) i f f ‘ is an extension o f f , then f’ is discontinuous at /3; (ii) the functional E is recursive in {f,d , r};
(iii) i f f ’ is a (0, 1)-ary functional such that f(a)N f ’ ( a ) whenever f(a)is defined and a is a total function, then ( d , r ) is a deflector f o r f’ at p. To prove (i), assume there is a finite function p’ ,f3 and f’(P’) is defined. Then there is an I such that ( X y ) d ( r ( z ) y, ) is an extension of p. This means that f ( P ) N f ’ ( P ) N f;,,.(z) N f d , , . ( z ) , and this is a contradiction. To prove (ii) we introduce a (1, 1)-ary functional g such that PROOF.
Chapter 14. Continuous Functionals
so g is recursive in { d , r } . Since
E(a)
N
f(P)
211 is defined, let
f ( p ) N 2).
[eq(v, f((Xy)g(y;a)))
+
We claim that
1901.
To prove the claim we first m u m e ( p z ) a ( z )N 20.If y 5 20, then ( p z < y)a(z) N y, hence g(y; a) N d(r(y), y) N p(y) 1: d ( r ( z o ) ,y). On the other hand, if zo < y we have ( p< y)a(z) N 20, hence g(y; a) N d(r(zO),y). From this it follows that
=
e d v , f((Xy)g(y;a))) 1.
Assume now that a(.) g(y; a)N d(r(y),Y)
$ 0 for all z. In this case ( p z < y)a(z)
N
y, hence
= P(Y), and
Finally, assume E ( a ) is undefined so there is to such that a ( z 0 ) is undefined, and a(.) 0 when z < 20. In this case we have g(y;a) N d(r(y),y) N P(y) if y 5 20, and g(y;a) is undefined when y > 20, so (Ay)g(y;a) is a finite function, and /3 is an extension of (Xy)g(y;a). Since f is discontinuous at P it follows that f((Xy)g(y; a)) is undefined. This completes the proof of (ii). To prove (iii) we note that all functions involved in the definition of a deflector 0 are total functions, so f and f’ agree on those functions. EXAMPLE 14.8 Assume P is a total function and the factorization ( d p , r) of Example
14.6 is a deflector for f at 14.7 (ii) is given by
P. In this case the functional g in the proof
g(Y;a)
=
dP((PZ
of Theorem
< Y ) 4 P ) , Y).
The proof shows that whenever ( p z ) a ( z ) N 20, then g(y;a) N dp(z0,y) for all y, hence f((Xy)g(y;a)) $ f(@. On the other hand, if a is total but ( p z ) a ( z ) is undefined, then g(y;a) N p(y) for all y, so f((Xy)g(y; a))N I(@). Otherwise, E ( a ) is undefined and p i s an extension of the finite function (Xy)g(y; a),so f((Xy)g(y; a)) is undefined. Part (ii) of Theorem 14.7 was proved by Grilliot for singular functionals, which are undefined for non-total arguments, using a singular version of the functional E. In our version neither the functional E nor the functional f are singular. The result implies a kind of minimality condition for E in terms of recursiveness. We shall see later that in applications we may need to assume that the functional f is singular.
L.E. Sanchis
212
In the rest of the chapter we prove a converse to Theorem 14.7, where from the fact that the functional E is recursive in a functional f it follows that f has a deflector at some p recursives in f , This result is also due to Grilliot. Note that the proof of Theorem 14.7 (ii) uses only p-recursiion with functional substitution. Functional recursion is not necessary.
Corollary 14.7.1 Let f be a (0, 1)-ary functional. Assume there is a total function p recursive in f , such that f (p) is defined, and whenever f o r Q total function a there i s a number zo such that a(.) N 0 if z > 20, !hen f ( a )$ f ( p ) . Then E is recursive in f . PROOF. Consider the factorization ( d p , r ) of Example 14.6. Clearly, this is a deflector for f at p, hence E is recursive in { f,d p , r}, Since dp is primitive recursive in p, p is recursive in f , and r is primitive recursive, it follows that E is recursive 0 in f.
14.9 Let E’ be the (0, 1)-ary functional such that E’(a) is undefined if is non-total, and E’(a) N E(a) if a is a total function. This means that
EXAMPLE Q
E’(a)
=
[E((Ay)s(a(y)))
+
E(a), E(a)l,
hence E’ is recursive in E. On the other hand, E is recursive in E’, for we can apply Corollary 14.7.1 with p = cl. The functional E‘ is recursively equivalent to E and, furthermore, is singular. We shall find the latter condition to be very useful in some situations. The proof of the converse to Theorem 14.7 (ii) requires a number of strong assumptions about the functional f. We start by obtaining a result that relates the functional E and the jump operator of Chapter 12. Note again that only p-recursion with functional substitution is required. Functional recursion is not necessary.
Theorem 14.8 If p is a total function, then pj is recursive in {E,p}. Let aP be the unary interpreter for the numerical functions in RC(p). From Theorem 13.6 we know that there is a primitive recursive function g and a total binary function h primitive recursive in p , such that
PROOF.
213
Chapter 14. Continuous Functionals
Hence we can express pj in the form
0
A class F of functionals is said to be weakly normal if the functional E is recursive in F. A functional f is weakly normal if E is recursive in f . The functional E’ in Example 14.10 is weakly normal. A continuous functional is not weakly normal. Corollary 14.8.1 If F is a weakly normal class of functionals, and p i s a total numerical function recursive in F,then p is also recursive in F. J
PROOF.
Immediate from Theorem 14.8.
0
If ,B is a total unary function there is a canonical factorization of ,b of the form (do, PO) as explained in Example 14.5. The function do is primitive recursive, and
rp is primitive recursive in p. Note that there is a primitive recursive (1, 1)-ary ) r p ( x ) when /3 is a total function. In fact, the functional r such that ~ ( t , p N functional r is given by the following explicit specification: P(Z,
a)
N
( e x p ( 2 ,t
+ 1)
x (IIi 5 t ) e x p ( p n ( i
+ I), a ( i ) ) )
1.
Note that it is possible that r ( x ,a)is defined in cases where a is not a total function. Let f be a (0,1)-ary functional and p a total unary function. We say that f is effectively discontinuous at /3 if there is a deflector for f at p of the form (do, r ) where r is recursive in f. Note that in this case p is recursive in f . We say that f is eflectively discontinuous if there is a total unary function such that f is effectively discontinuous at p. EXAMPLE 14.10 The functional E is effectively discontinuous at any unary function
/3 which is recursive in E and satisfies the condition
p(x) 74 0 for all E , with deflector
( d 0 , r p ) . This is also true for the functional E’of Example 14.10. Note that if p is a total function such that p(z) N 0 for some 2 , then E’is discontinuous but not effectively discontinuous at ,B. In fact, there is no possible deflector for E’ at p.
In relation to the function do we introduce the primitive recursive binary function ext such that ext(v, ).
N
KEY < [ ~ l o ) e q ( d o ( Y), t , do(v, Y)).
L.E. Sanchis
2 14
+
Note that in case z =
, then [z]~ = 2’ 1 , and whenever y I z’, then d o ( z , y ) 2: p(y). In general, if z < v , then ext(rp(w),rp(z)) N 0. T h e function ext is, of course, total. Now we fix a (0, 1)-ary functional f which, in general, will be assumed to be quasi-total, and we introduce a unary numerical function p such t h a t
I f f is quasi-total, then p is a total function. Theorem 14.9 Assume f is quasi-total and /? i s a total unary function recursive i n f . I f f is not effectively discontinuous at p, there is a number 20 such that whenever ezt(z’, r p ( z 0 ) ) N 0 , then f ( P ) N p ( z ’ ) . Assume there is no such number 2 0 . Then for every there is z’ such t h a t ext(z’, r p ( z ) ) 2: 0 and f ( p ) 34 p ( z ‘ ) . Let r‘ be the function such that
PROOF.
I t follows that r’ is a total function recursive in f , and ( d o , r’) is a deflector for f 0 a t ,B, so f is effectively discontinuous at 0. Corollary 14.9.1 Assume f is quasi-total, p is a total unary function recursive in f , f is not effectively discontinuous at /3, and there is a number x1 such that p ( z ’ ) N p ( r p ( z 1 ) ) whenever ezt(z’, r p ( z 1 ) ) N 0. Then j ( p ) N p ( r p ( z 1 ) ) .
14.1 1 We show now how Theorem 14.9 and Corollary 14.9.1 can be used to evaluate f (p) when f is quasi-total, p is recursive in f , and f is not effectively discontinuous a t p. Simply, we search for the least z such t h a t p ( z ’ ) N p ( r ( z , , B ) ) EXAMPLE
when ext(z’, r ( z , p ) ) N 0, and we set f ( P ) N p ( r ( z , P ) ) . To formalize the searching we introduce a binary function p’ and a unary function g. T h e function p‘ is primitive recursive in p :
Chapter 14. Continuous Functionals
215
The function g , which is not recursive in p , is given by the following specification: g(z)
2:
N
0 1
if p’(z’, z)N O for all otherwise.
2’
We can rewrite the expression above as
This relation holds, provided that f is quasi-total, p is a total function recursive in f , and f is not effectively discontinuous at p. Theorem 14.10 Let f be a quasi-total functional, and pj the j u m p of the unary function p above. I f f is not effectively discontinuous there is a functional f‘ which is recursive in p . , and f is quasi-similar to f ’ . J
PROOF.
We take the last expression in Example 14.12 and set
We know that r is primitive recursive, p is recursive in pj b y Theorem 12.7 (i), and f’ is recursive in p j . Since f is not effectively discontinuous it follows that whenever ,B is a total function recursive in f we have
g is recursive in pj by Theorem 12.8. It follows that
f ( P ) = f’(P), so f is quasi-similar to f’,
0
Corollary 14.10.1 Let f be singular and quasi-total. Assume f i s not effectively discontinuous. There is a function p recursive in f such that if h is a total function recursive in f , then h i s recursive an p . J
PROOF. We know that the functional f is singular and it is quasi-similar to f’ that is recursive in pj. By Theorem 12.9 it follows that h is recursive in f’, hence h is 0 recursive in p
J’
Theorem 14.11 Let f be a ( 0 , 1)-ary quasi-total, singular functional. The following conditions are equivalent:
( i ) f is weakly normal.
216
L.E. Sanchis
(ii) If p is a total function recursive in f , then pJ. is also recursive in f . (iii) f is effectively discontinuous. (iv) There i s a total function @, and a deflector ( d , r )f o r f at @, where both d and r are recursive in f.
The implication from (i) to (ii) follows from Theorem 14.8. The implication from (ii) to (iii) follows from Corollary 14.10.1. The implication from (iii) to (iv) is trivial. The implication from (iv) to (i) follows from Theorem 14.7 (ii). 0
PROOF.
EXERCISES
14.1 Give an example of a non-continuous (0, 1)-ary functional f such that whenever p is a total unary function there is finite @’ @ and f ( p ) is defined. 14.2 Give an example of a continuous quasi-total (0, 1)-ary functional f such that there is an extension o f f which is not continuous. 14.3 Assume f is a (0, 1)-ary quasi-total functional and @ is a total unary function. Prove the following conditions are equivalent: (a) I f f ’ is an extension o f f , and
@’
@ where
@’
is finite, then f ’ ( P ’ ) is
undefined.
(b) There is a deflector ( d , r ) for f at @ where r is a primitive recursive function. ( c ) There is a deflector for f at @.
(d) If f’ is similar to f , then there is a deflector for f’ at @. 14.4 Let f be a quasi-total (0, 1)-ary functional. Prove the following conditions are equivalent : (a) If @ is a total function there is no deflector for
f a t p.
(b) There is a functional f’ similar to f , and f’ is recursive in a total numerical function.
Chapter 14. Continuous Functionals
217
( c ) There is a continuous functional similar to f
14.5 Let f be a continuous quasi-total (0, 1)-ary functional. Prove that there is a continuous functional f’ similar to f , and f’ is recursive in a total numerical function.
14.6 Let Eo be the (0, 1)-ary functional such that Eo(Q)is undefined if Q is not a total function, and Eo(Q)cz 0 if Q is a total function. Prove that Eo is recursive in E but E is not recursive in Eo.
The theory of continuous functionals, in the context of recursive functionals, was initiated in Kleene [17]. A similar theory, oriented to the foundations of mathematics, is given in Kreisel [19]. The standard terminology is countable rather than continuous. The literature on countable functionals is rather extensive. For references, see Norman [22]. Theorem 14.11 is derived from Grilliot [7]. Degrees of continuous functionals are studied in Hinman [la].
This Page Intentionally Left Blank
Chapter 15
A Selector Theorem In this chapter we prove that reflexive structures of the form RC(F), where F is a finite set of functionals, have the p-selector property, provided the functionals in 3 satisfy a number of restrictions. We apply here Theorem 11.7 (ii), so the result requires the definition of a preorder functional. The construction involves functional recursion with a fairly large number of cases. If (@,S) is an interpreter for the class RC(F), then a preorder functional PO satisfies a number of conditions. First, po(z,z’; a) is defined in case either @ ( z ;a) is defined or @ ( z ’ ; a )is defined. Second, if p o ( z , z ’ ; a )$ 0, then @ ( z ’ ; a )is defined. Finally, we assume that if po(z, z’;a ) $ 0, then @ ( z ;a) is defined. The last condition is stronger than the one imposed in the original definition. The preorder functional PO is specified by functional recursion derived from the universal interpreter of chapter 12, where @ = @ I is specified by functional recursion with equations RD 1 t o RD 9. We shall consider only the case where 3 = {G}, and G is a (1, 1)-ary functional. In order to specify PO we must assume that G is weakly normal, so E is recursive in G. To prove that PO is actually a preorder functional we must assume that G is quasi-total and singular. The preorder functional defined for the class RC(G) is a (2,l)-ary functional PO, specified by functional recursion. The cases of this recursion are derived from
the cases in the specification of @ in Chapter 12, and we use notation rpi, eqi, rg; , etc., with exactly the same meaning. As usual, the order of the equations in a 219
220
L.E. Sanchis
recursive system is essential, although in some disjoint cases the interchange of some equations will not change the specification. We introduce t h e different equations in the order they take in the specification. At this stage we make only one assumption about G, namely, that the functional E is recursive in G. This means that G is weakly normal in the sense of Chapter 14. T h e specification of PO involves two functionals t h a t are recursive in E, namely, E’ and E”. T h e functional E’ was defined in Chapter 14. T h e specification of E” is as follows: E”(a) is undefined if a is not a total function. If a(.) N 0 for all I, then E”(a) N 0. If a(.) 74 0 for some 2, then E”(a) N 1. T h e specification of PO follows a typical strategy, where the specification of p o ( z , z ’ ; a )depends on the specifications of @ ( % ; a and ) @ ( z ’ ; aby ) rules RD 1 t o RD 9. If @ ( z ; a )depends on @(y;a) (among other conditions), and @(“’;a) depends on @(y’; a ) among other conditions), then the specification of po(z,2’; a ) depends recursively on po(y,y‘; a ) . To organize these relations we assume that if po(y,y’; a ) N 0,then @(y; a ) is defined, and in case po(y,y’;a ) 34 0,then @(y’; a ) is defined. We assume also t h a t in case po(y,y’;a ) is undefined, then both @(y; a ) and @(y’; a ) are undefined. T h e preceding explanation should help the reader to understand the motivation for the different cases in the recursion. A complete explanation will follow from the proofs given a t the end of this chapter. Each case in the specification of po(z,z’;a)is denoted by a pair of numbers ( i , j ) ,which means that z is controlled by case RD i, and z’ by case RD j in the ’ ;) , respectively. In the first two equations where specification of @(P; a ) and @ ( t a i = 1 and i = 2, the parameter j is not relevant and we write ( 1 , O ) and ( 2 , O ) . Similarly, in equations 3 and 4 where j = 1 and j = 2, t h e parameter i is not relevant and we write ( 0 , l ) and (0,2). Case ( 1 , O ) : Here rp\(t,0) N 0 and z’ is arbitrary. po(z,z’;a ) N 0 Case ( 2 , O ) : Here rpi(z,2) 0 and z’ is arbitrary. po(2,2’;a ) N 0 Case ( 0 , l ) : Here z is arbitrary and rpi(z’,0) N 0. po(z,2’;a ) N 1 Case ( 0 , 2 ) : Here P is arbitrary and rp;(z’, 2) N 0. po(z,z’; a ) N 1
Chapter 15. A Selector Theorem
22 1
Note that in cases (1,O) and (2,O) po(z, z ; a) is defined even if @ ( z ’ a ; ) is undefined. Similarly, in cases ( 0 , l ) and (0,2) po(z, z’; a ) is defined even if @ ( z ;a ) is undefined.
po(z,z‘; a)N c y q z ; a ) ) Case ( 4 , j ) , j = 3 , 4 , 5 , 6 , 7 , 8 , 9 ,or 10. The equations are identical to the equations in case ( 3 , j ) .
L.E. Sanchis
222
Case ( 5 , j ) , j = 3 , 4 , 5 , 6 , 7 , 8 , 9 ,or 10. The recursive equation for case ( 5 , j ) is obtained from the equation in case ( 3 , j ) above, by the replacement of gl(z, d ( z , 1,2)) with gl(z, d ( z , 1,3,1)). Case (6,3): Here eql((z, 6) abbreviations:
N
0 and rp;(z’, 3)
2:
0. We introduce the following
Case ( 6 , j ) , j = 4,5, or 7. The equation in case ( 6 , j ) is similar to the equation in case (6,3), replacing gl(z‘, d ( z f , l ,2)) with gl(z‘, d(z‘, 1 , 3 , 1 ) ) if j = 5, and with gS(z’) if j = 7. No change is necessary when j = 4. Case (6,6): Here eql(z, 6) abbreviations:
N
0 and eql(z’, 6)
Case (6,8): Here eql(z,6) abbreviations:
2~
0 and rgl(z‘, 1) N 0. We introduce the following
Case (6,9): Here e q l ( 6 , l ) abbreviations:
N
0 and rp;(z‘, 9)
N
N
0. We introduce the following
0. We introduce the following
223
Chapter 15. A Selector Theorem
Case (6.10): Here eq1(6,1) 2: 0 and rp;(z’,9) $ 0. P O ( % ,t’;a) N cO(@(z;a)).
Case ( 7 , j ) , j = 3 , 4 , 5 , 6 , 7 , 8 , 9 ,or 10. The recursive equation for the case ( 7 , j ) is obtained from the recursive equation in case ( 3 , j ) above, by the replacement of g1(z, d ( t , 1 , 2 ) ) with g5(z). Case (8,3): Here rg,(z, 1) N 0 and rpi(t’, 3) ations:
11 0.
we set the following abbrevi-
A = PO(L?l(t., d(t,1,3)),!7l(Z’, 4 2 ’ 9 192)); a) B = E”((AY)P0(!77(Z,Y), g1(z’, 4 2 ‘ , L2)); a)) p o ( r , z‘; a)N [A B, 11 -+
Case ( 8 , j ) , j = 4,5,or 7. The equation in case ( 8 , j ) is similar to the equation in case (8,3), replacing gl(r’d(t’, 1,2)) with gl(z’, d(z’, 1,3,1)) if j = 5, and with gS(t’) if j = 7. No change is necessary if j = 4. Case (8,6): Here r g l ( t , 1) N 0 and eql(z’, 6) N 0. We set the following abbreviations:
A = E”((AY)(ni < d(z’, 1,3, o))PO(g~(z,Y), gdz‘, i ) ;a)) B = P 4 7 l ( Z , 4 t . j 1 , 3 ) ) , 9 3 ( 4 ;a) c = E”((~y)po(g7(z,Y), 93(2’); a)) D = (ni< d(z’, 1,3,O))po(gi(z, d(2,1,3)),9~(2’,i); a) PO(%,t‘; a)N [ A -+ [B -+ O,D], [C + B , 111. Case (8,8): Here r g l ( z , 1) c! 0 and rgl(t’,1) 2: 0. We introduce the following abbreviations:
L.E. Sanchis
224
Case (8,lO): Here r g l ( z , 1) N 0 and rp;(z‘, 9) $ 0. PO(%,2 ; a )N
c0(3(2;
Case (9,3): Here rp;(z, 9)
N
a)).
0 and rpi(z’,3) N 0. We set the following abbre-
viations:
Case (9, j ) , j = 4 , 5 , or 7. T h e recursive equation in case (9,j)is similar to the equation in case (9,3), replacing gl(z’, d(z‘, 1, 2)) with gl(z’, d(z’, 1 , 3 , 1 ) ) if j = 5, and with gs(z’) if j = 7. N o change is necessary if j = 4. Case (9,G):Here rp;(z, 9) viations:
N
0 and eql(z’, 6)
N
0. We set the following abbre-
Chapter 15. A Selector Theorem
225
L.E. Sanchis
226
A = po(gs(z, 2), ga(z’, 2); a) B = @(gS(Z,2); a) c = @(ga(z’,2); a) D = PO(g8(z, 3), !?8(z’,2); a) E = po(ga(z,4), ga(z‘, 2); a) D’ = Po(g8(Z, 217 !?8(2’, 3); a) E’ = po(ga(z, 2), ga(r’, 4); a) F = po(ga(r, 3), ga(Z’, 3); a) G = Po(gS(z, 3), ga(z’, 4); a) H = po(ga(z, 41, ga(z’, 3); 0) = Po(gS(z, 4 ) , !?8(z’, 4); a) M = [B + [ D --* 0, [C F, GI], [ E + 0, [C --* H , I~III N = [C --* [D’ + [B + F, HI, 11, [E’ --* [B --* G, K ] ,111 p o ( r ,z’; a)N [ A + M , N ] . +
Case (9,lO): Here r p i ( z , 9) N 0 and r p i ( z ’ , 9 ) $0. p o ( z , z ’ ; a) N
CO(@(%,
a)).
Case (10,O): Here rp;(z,9) $ 0 and z‘ is arbitrary. po(2,z’;a)N d(@(z‘; a)).
This completes the specification of the functional PO recursive in G under the assumption that G is weakly normal. To prove that PO satisfies conditions P O 1, P O 2, and P O 3 we will need extra assumptions about G. The process that determines the equations is, in fact, quite mechanical and fairly straightforward. To obtain the value of po(z, 2’; a) we consider the equations for @ ( z ; a and ) @(,’;a)which, in general, involve a number of subterms of the form @(yl;a),‘P(y2;a),. . . for @ ( z ; a) and @(A; a),a(&; a),. . . for @(r‘;a).The idea is to evaluate recursively all possible combinations po(y1, y;; a),po(y1, &; a), po(y2, y;; a),po(y2, &; a),. . . , and organize these values in a tree from which information about @ ( z ; a) and @(z’; a) can be determined. Finally, this information is used to determine p o ( z , z’; a). Each case in the definition of PO is given by an expression which describes an evaluation by cases. The reader is advised to expand these expressions in a tree form, from which the different sequences of cases can be derived as branches in the tree. For example, in case ( 9 , 9 ) the tree expansion takes the following form:
Chapter 15. A Selector Theorem
C
/ 0
D
/
227 A
/ \E
' '\ F
O
G
F
'\
G
Note that a branch to the left corresponds to a case = 0, and a branch to the right corresponds to a case # 0. The preceding tree describes seven possible branches, and each branch describes a possible evaluation. For example, the leftmost branch is A , C , D, 0 and corresponds to A N 0, C N 0, D N 0. The output of the evaluation is 0. Another possible branch is A , C , E , G, where A N 0, C N 1, and E N 1. The output of the evaluation is the value of G. Each case in the specification of PO has been written trying to satisfy two different goals. We refer to these goals as consistency and completeness. They are defined in the rest of this chapter. To satisfy one of the goals, we risk an injury to the other goal. The final proof shows that both goals are satisfied. Note that in general there are many ways to arrange the cases in such a way that both consistency and completeness holds, so there are many different preorder functionals that can be obtained by the method described above. For example, see Exercise 15.2. We say that an application of the form po(z, z'; a) is consistent where a is an arbitrary function, if p o ( z , z ' ; a ) N v and either v = 0 and @(%;a)is defined, or v = 1 and @("';a)is defined. Theorem 15.1 Let G be quasi-total, a total, and po(z, z ; a) N U where U is an expression determined by the corresponding recursive equation. Assume that U N v and that every application of po in the evaluation is consistent. Then, either v = 0 and @ ( z ; a) is defined, o r v = 1 and a(%'; a) is defined.
We must consider each possible form of the term U ,as determined by the recursive equations, and show that in every case the condition is satisfied. We discuss a few cases. PROOF.
L.E. Sanchis
228
Consider the case (3,8), so po(z, z ; a ) N [ A + 0, B] N v .
There are two possible branches here, namely ( A , O ) where A N 0 and 2) = 0, or ( A , B ) where A N 1 and B N v . In the branch (A,O) the condition A TZI 0 and the consistency of PO implies that @(gl(z,d ( z , 1,2)); a ) is defined, hence @ ( z ;a ) is defined by RD 3, for a is a total function. In the branch ( A , B ) we consider v = 0 and v = 1. If B N v = 0, then there is at least one y such that p o ( g l ( z , d ( z , 1,2)),g7(z’,y);a) N 0, hence from the consistency of PO we get @(gl(z,d(z,1 , 2 ) ) ; a ) is defined, and @ ( z ; a )is defined by RD 3. If B N v = 1, this means that po(gl(z,d(z,1,2)),g7(z’,y);a) N 1 for every y, hence @(g7(z’,y);a) is defined for every y. On the other hand, from A N 1 we get that @(gl(z’,d(z’, 1,3)); a ) is defined. Since G is quasi-total it follows that @(z’;a ) is defined by RD 8. In case (6,8) the equation is of the form p o ( z , 2’; a ) N [ A 4 [B 4 0, D], [C 4 D , 1]],
and four branches must be considered. We discuss only the branch ( A , C , D ) , where A N 1, C N 0, and D N v. If v = 0 we get for at least one y that PO(gg(Z), g7(Z‘, y); a) 2: 0, hence @(g3(Z);a ) is defined. From C N 0 we get for at least one y that ( X i < d ( z , 1,3,O))po(gz(z, i ) , g7(z’, y); a ) N 0, hence @(gz(z,i ) ;a) is defined for i < d(z, 1 , 3 , 0 ) ) , and (IIi < d ( z , 1 , 3 , 0 ) ) @(ga(z,i ) ; a) is defined. We conclude that @ ( z ;a ) is defined by RD 6. If v = 1 we get that @(g7(z’,y); a ) is defined for every y, and from A N 1 we get that @(gl(z’,d(z’, 1, 3)); a) is defined. We conclude that @(z’;a)is defined by RD 8. In case (9,3) there are three branches and we consider the branch ( A , B , D ) , where A N 0, B $i 0, and D N v. If 2) = 0 we get @(gs(z,4); a) is defined and from B $i 0 we see that @ ( z ;a ) is defined by RD 9. If v = 1 we get @(gl(z’, 1,2)); a ) is defined. Since a is total we conclude that @(z; a ) is defined by RD 3. In caae (9,9) there are twelve branches and we consider the branch ( A ,B , E , C, H ) , where A N 0, B $i 0, E N 1, C N 0, and H N v . If v = 0 we get @(ga(z,4);a ) is defined, and from B $i 0 i t follows that @ ( % ; ais) defined. If v = 1 we get 0 @(ga(z’,3); a) is defined and from C = 0 it follows that @(z’;a) is defined. Corollary 15.1.1 Assume G is quasi-total. If p o ( z , z ; a) is defined, and a is a total function, then the application p o ( z , z’; a ) is consistent.
Chapter 15. A Selector Theorem PROOF.
229
We know PO is the minimal fixed point of a functional transformation
Tf = f’, where f and f‘ are (2,l)-ary functionals, so Tpo = PO, and whenever Tf C ~ , fJ, then f is an extension of PO. To apply this property we introduce a new (2,l)-ary functional PO’ such that: po’(z,2‘; a)
N
0
N
1
if whenever a’ is a total extension of a,then PO(%, z’; a‘) N 0 and @ ( z ; a‘) is defined. if whenever a’ is a total extension of a,then po(z, z’; a‘) 21 1 and O(z’; a’)is defined.
The functional PO’ is undefined outside these two cases. Note that when a is a total function, then po’(z,z‘; a) is defined if and only if the application po(z, z’; a) is consistent, and if this is the case, then po(z, z‘; a) N PO‘(%, z‘; a). Now we set Tpo’= PO” and prove that PO’is an extension of po”. If po”(z, z’; a) N v where a is an arbitrary function, then there is a case in the specification of PO where po(z, z’; a) N U , po”(z, 2’; a) N U1 N v, and lJ1 is obtained from U by replacing all occurrences of PO with PO’. To show that po’(z, z’; a)N v we take a total function a’ which is an extension of a and set U’ by replacing a with a’ in U , and U[ by replacing a with a’in U1. By monotonicity it follows that U; 21 v , and it is clear that the evaluation U; N v can be translated into an evaluation U’ I Iv . Furthermore, since the evaluation of U’ uses PO where the evaluation of V; uses PO’, it follows that the applications of PO are consistent. From Theorem 15.1it follows that v = 0 and @ ( z ;a‘) is defined, or v = 1 and @(z’; a’)is defined. This means that PO‘(%, z’; a)N v , and PO’ is an extension of PO”. The preceding argument proves that PO‘ is an extension of PO. Hence, if PO(%, z’; a)N v and a is total, then PO’(%, z’; a) 2: v and either v = 0 and @ ( z ;a) 0 is defined, or v = 1 and @(z’; a) is defined. We move now to the second relevant property of the functional PO, namely, completeness. We say PO is lefl complete at ( z ;a) if po(z, z’; a) is defined for all z’. Similarly, PO is right complete at (2’; a) if po(z, z’; a) is defined for all z. The completeness properties of a pair ( z ; a )depend to a great extent upon a set of numerical values that are determined by the recursive equation that applies in the evaluation of @ ( z ; a ) . So, if one of the rules RD 1 to RD 9 applies to @ ( z ; a )we shall say that (%;a) depends upon a set of values Dz;a as follows. If
L.E. Sanchis
230
rule RD 1 or RD 2 applies, then Dzia is empty. If rule RD 3 or RD 4 applies, then Dz;a contains only gl(z,d(z,1,2)). If rule RD 5 applies, then DZiacontains only g l ( t , d ( z , 1,3)). If rule RD 6 applies, then D Z ; , contains all values gz(z,i) for i < d ( r , 1 , 3 , 0 ) , and also the value gS(t). If rule RD 7 applies, then D2;a contains only the value gS(.z). If rule RD 8 applies, then DZ;, contains the value gl(z, d(t,1,3)), and also the value g7(t, y) for all y. If rule RD 9 applies, then D2;a contains the values gs(t, 2). Furthermore, if CP(gs(z, 2)) N 0, then D 2 ; , contains the
value g 8 ( t , 3), and if @(gS(z, 2)) 74 0, then Dz;a contains the value gs(z, 4). If none t ; then D Z i ais undefined. of these rules apply to @ (a), Theorem 15.2 Assume
G is quasi-total and a is a total function. Then
(i) If @(%;a)is defined and PO is left complete at (y;a)whenever y is an element of D,;,, then PO is left complete at ( z ; a ) . (ii) Zf @@’;a) i s defined and PO is right complete at ($;a)whenever y’ is an element of D Z : ; , ,then PO is right complete at (2’; a). . To prove (i) we must show that p o ( z , z ’ ; a ) is defined for any arbitrary t and z’ we have po(z, z’;a) N U where U is an expression in the specification of PO. The expression U involves terms of the form po(y, y’; a) where y is an element of D,;,, so these terms are always defined. The expression U also involves occurrences of the functionals E’ and E”, which are defined because they are applied to total lambda expressions. Finally, U may contain expressions of
PROOF.
2. Depending on
the form O ( g s ( z , 2)) or CP(ga(t’, 2)), but then these expressions are defined because they are preceded (in the chain of cases) by conditions po(gs(z, 2), y;a) N 0 or po(y,gs(r’,2); a)74 0, and consistency applies by Corollary 15.1.1. 0 The proof of part (ii) is similar. Corollary 15.2.1 Assume the functional G i s quasi-total and singular. Then
(i) Zf CP(.z;a) is defined and a is
a
total function, then PO is left complete at
(2;
a).
(ii) If @(%‘;a)is defined and a is a total function, then PO is right complete at (2’;a).
PROOF.
To prove (i) we introduce a (1,l)-ary functional CP’ such that W ( z ; a)N v
if whenever a’is a total extension of a,then O ( z; a’)‘v v and PO is left complete at ( z ; a’),
Chapter 15. A Selector Theorem
231
and @‘(z; a) is undefined otherwise. We shall prove that @‘ is an extension of @ by showing that T@’c1,1@‘, where T is the monotonic transformation induced by the recursive specification of @. we set T@’= @’’and assume @ ” ( z ; a)N v. This means there is a term U in the recursive specification of @, such that @ ( z ;a) N U , and U1 cz v, where U1 is obtained from U by replacing @ with a’. To prove that @’(z; a) N v we take a total extension a’ of a and obtain the term U’ by replacing a with a’ in U , and the term U i by replacing a with a’ in U1. By monotonicity we have Ui N v, and given the form in which 0’ is derived from @, we have also U’ v , hence @ ( z ; a ’ )N v. Noting again the form in which @’ is derived from @, and the assumption that G is singular, we conclude ~ follows that PO is left complete at (y, a‘). that whenever y is an element of D z ; a it By Theorem 15.2 (i) we conclude that PO is left complete at ( z ; a’).Since a‘ is an arbitrary total extension of a,we have a’(”; a) N v. The preceding argument shows that @’ is an extension of @, hence if @ ( z ; a) is defined and a is a total function, then PO is left complete at ( z ; a). The proof of part (ii) is similar. We introduce a functional @’ again, but using 0 right completeness rather than left completeness, and Theorem 15.2 (ii). Theorem 15.3 Assume the functional G is singular and quasi-total. If a is a total function, then PO satisfies the following conditions:
(i) I f p o ( z , z‘; a) i s undefined, then both @ ( z ;a) and @(z’; a) are undefined. (ii) If po(z, z’; a) N 0 , then d ( z ; a) is defined.
(iii) I f p o ( z , z’; a)$ 0 , then
$(z’; a) is
defined.
Part (i) follows from Corollary 15.2.1. Parts (ii) and (iii) follow from 0 Corollary 15.1.1.
PROOF.
Corollary 15.3.1 If G is singular and quasi-total, then PO i s a RC(G), and RC(G) has the p-selector property. PROOF.
Immediate from Theorem 15.3 and Theorem 11.9 (ii).
(a,S)-preorder i n 0
We say that a class 3 of functionals is normal if E is recursive in 3,and the functionals in 3 are singular and quasi-total. For example, the functional E is not singular, so E is not normal. On the other hand, the functionals E‘ and E“ are both normal.
L.E. Sanchis
232
Theorem 15.4 A s s u m e the class 7 is n o r m a l . T h e n R C ( F ) h a s the p-selector property.
If the predicate P is in R C p ( F ) there is a finite class TO F such that P is in R C p ( F 0 ) and E is recursive in 3 0 , The construction in Chapter 12 provides an interpreter for R C ( F 0 ) and the procedure in this chapter can be easily extended to define a preorder functional for R C ( F 0 ) . It follows that P has a selector functional in R C ( F 0 ) 5 R C ( F ) . 0
PROOF.
EXERCISES
15.1 Assume one of the rules RD 1 to RD 9 applies in the evaluation of @ ( a). t; Assume also that a is a total function and the functional G is singular and quasi-total, Prove that @ ( z ;a) is defined if and only if @(y;a) is defined for every y in the set Dzio. 15.2 Redefine the specification of PO in case (8,6) by setting: p o ( r ;t';a) N [C + B
4
0, D], [ A -+ B , 111.
Prove that Theorem 15.1 and Theorem 15.2 are still valid with this definition. 15.3 Explain why the requirements that G is quasi-total and a is total are necessary in the proofs of Theorems 15.1 and 15.2. 15.4 Explain why the requirement that G is singular is necessary in the proof of Corollary 15.2.1. 15.5 Let f be a normal functional and p a numerical function recursive in f. Prove there is a total numerical function p' recursive in f which is not recursive in
P.
Notes The selector theorem was announced in Gandy [6]. The proof given here is derived from Hinman [lo]. For another application, see Chapter 5, $3, of Sanchis [27].
Chapter 16
Hyperenumeration This chapter is concerned with the properties of quantification over functions, although only a restricted form will be considered, namely, barred quantification. This type of quantification may be existential or universal, and existential barred quantification can be considered a generalization of existential numerical quantification. As the latter was referred to as enumeration, we shall refer to the former as hyperenumeration. In this context bounded numerical quantification loses its significance and is absorbed by unbounded quantification. So, essentially, we shall be dealing with two types of quantifiers: unbounded numerical quantifiers and barred function quantifiers, where each can be existential or universal. Occasionally we may introduce references to bounded quantification. To some extent we shall deal also with unbarred function quantification. General, or unbarred, function quantification is introduced informally. If U is a boolean expression, i.e., a totally defined expression which may take either of the two boolean values, then the expression
means that U holds for all total values of the function variable a. Similarly, the expression
(3a)U 233
L.E. Sanchis
234
means that there is some total function a such that U holds. Note that only total functions are included in the range of both quantifiers. The restriction of function quantification to total functions is another indication of the special role these objects play in the theory of recursive functionals. A similar situation was found in the definition of the characteristic functionals, and in some sense the rationale is the same in both cases. We want predicates to be total operations, well defined even for partial arguments. In representing and manipulating these predicates we must compromise and pay special attention to the total arguments. Partial arguments are essentially approximations to total arguments, and their properties need not be completely determined.
-
16.1 Let U be the expression a(.) N y. Then (Va)(Vc)(3y)U holds, and (3a)(3y)(Vz)Ualso holds. On the other hand, (3a)(3r)(Vy) U does not hold.
EXAMPLE
In order to define the barred quantifiers we need the auxiliary (1, 1)-ary primitive recursive functional br such that
Hence br(0,a) N 0 and br(z+l,a)N . We abbreviate br(z;a)2~ &(X).
Note that the functional br(z;a)may be defined even if a is not a total function. In practice this possibility can be ignored, for the expression E(z) is used when a is in the scope of a function quantifier, hence i t is restricted t o total functions. Existential Barred Quantification. Let Q be a (k 1, m)-ary predicate. We introduce a (k,m)-ary predicate P such that
+
We say that P is obtained from Q by existential barred quantification. Universal Barred Quantification. Let Q be a (k 1,m)-ary predicate. We introduce a ( k , m)-ary predicate P such that
+
We say that P is obtained from Q by universal barred quantification. We consider a barred quantifier, existential or universal, to be just one quantifier, even if we need two quantifiers to express its meaning. The use of "barred" function
Chapter 16. Hyperenumeration
235
quantification is similar to the use of “bounded” numerical quantification. Which one should be called existential and which one universal is a matter of personal preference. We think that by using the expression “barred” we are being explicit about the function quantifier, so we need only to identify the number quantifier. The two bar quantifiers are related by the usual rules that apply to the standard quantifiers. Hence
Furthermore, both can be exported over disjunction and conjunction, provided that collision of variables is avoided.
Theorem 16.1 There are primitive recursive functions ever P is a ( k + 2, m ) - a r y predicate, then
dl
and
d2
such that when-
See proof of this property in Theorem 5.1.1 of [25].
PROOF.
0
16.2 Let p be a total binary function. A descending pchain is a sequence (finite or infinite) to,1 1 , . . ., t,, . . . such that xi # Zi+l, and p(Zi+l, t i ) N 0 holds for i = 0,1, . . ., n,.. .. We can express the property that there is no infinite descending pchain in the form
EXAMPLE
where Q is the unary numerical predicate such that Q(y)
=
There are numbers 1 1 , . . . , t , , , t n + l , n 2 1, such that y = < t 1 , . . . , i , , , x n + 1 > , p ( z i + l , z i ) N 0 whenever 1 5 i < n, and either z, = z,+l or p ( z , + l , t , ) $! 0.
-
Similarly, we can express the property that there is an infinite descending pchain by the expression: (3P)(Vy) Q(p(y)). Let P be a class of predicates. If a predicate P is obtained by existential barred quantification from a predicate Q in P, we say that P is P-hyperenumerable. We denote by Phe the class of all P-hyperenumerable predicates. If P is obtained from
L.E. Sanchis
236
Q by universal barred quantification we say that P is P-cohyperenumerable. We
denote by Phu the class of all P-cohyperenumerable predicates. As usual, these subscripts can be concatenated with the same or different subscripts. For example, we can write P d h c or Phcc. We can also write P h e h e or P h e h u , etc. If 7 is a class of functionals, then we can write F d h e or F p h c . We can also write F d h e g , which is a class of functionals. When the subscript is applied to a class determined by some operator we apply the subscript to the operator itself, which in this way becomes a new operator. For example, if F' = Rc(F), then we write = f?Cdhc(F), and RCdhe is an operator that can be applied to classes of functions to obtain classes of predicates.
Fihc
Theorem 16.2 Let P be a class of predicates closed under substitution with primitive recursive functions. Then,
(i) P
?he and p h c as closed under substitution with primitive recursive functions.
(ii) Phehe (iii) P c
c Phe.
c Phe.
(iv) phe = Pehe = Phee = Phehe. PROOF. Part (i) is trivial, and part (ii) follows from Theorem 16.1. To prove (iii),
assume the predicate P is obtained from Q in the form
and Q is in P . It follows that
so P is in Phc. To prove (iv), note that
phc
Pchc
Pchc
C Phcc
?hee Phchc
(since P C P c ) (since Pe C Phc C ?'he.)
Phchc
(by (iii) applied to Phc)
phc
(by (ii)). 0
Chapter 16. Hyperenumeration
237
Note that the relation Phehe C ?he means that ?he is closed under existential barred quantification. Similarly, the relation Phee = ?he in part (iv) of the preceding theorem means that p h e is closed under existential unbounded quantification.
Theorem 16.3 Let P be a class of predicates closed under substitution with primitive recursive functions, distribution, conjunction, and disjunction. Then (i) ?he
is closed under distribution, conjunction, and disjunction.
(ii) phe is closed under existential unbounded quantification and existential barred quantijcation. (iii) If P contains the primitive recursive numerical predicates, then phe as closed under universal unbounded quantification, and under universal and existential bounded quantification. Part (i) follows by exportation of barred quantifiers, and part (ii) from Theorem 16.2. To prove (iii) we note that PROOF.
P ( z ;a)
= WY)Q(Y,
2; a )
z;a ) A 0
(VP)(3y)(Q([p(y)lij
< [p(~)lo).
Closure under bounded quantification follows from unbounded quantification in combination with conjunction, disjunction, and primitive recursive numerical predicates. 0 EXAMPLE 16.3 Assume the class F is closed under primitive recursive operations. Then Theorem 16.3 applies to F d h e .
16.4 Assume the class T is closed under p-recursive operations. Then Theorem 16.3 applies to Tphe = Fpehe. EXAMPLE
To study the relation between hyperenumeration and recursive operations we introduce the (0, 1)-ary functional H such that:
H ( a ) N v iff
ct
is total, v = 0, and (V@)(3w)a(p(w))N 0.
Note that if P is the (1, 1)-ary predicate and Q is a (0, 1)-ary predicate such
that
P(y;a)
=
a(y)
&(;a)
=
( V P ) ( ~ W ) P ( P (a), ~>;
N
0
L.E. Sanchis
238
then H is a characteristic functional of Q. The predicate P ( y ; a ) may hold even if a is a non-total function and, similarly, &(; a ) may hold even if a is non-total. On the other hand, H(a) is undefined when a is a non-total function. This is perfectly normal, for partial characteristic functionals are not necessarily defined for non-total arguments. Theorem 16.4 The functional H is recursive in the functional E. PROOF.
We recall the functional E” defined in Chapter 15 and introduce the func-
tional T O ( a )N [E”(a)+ O , O ] .
So TO is recursive in E and TO(&) is defined if and only if a is a total function, and if this is the case, then T O ( a )N 0. Next, we introduce a recursive equation with a (1, 1)-ary symbol p :
where cc is a binary primitive recursive function such that if cc(y, z) = z’, y = < y 1 , . . . , yn>,x = <x1,. . . , x,>, then x’ = < y 1 , . . ., yn, 2 1 , . . ., z,>. We assume that in case y is not a sequence number, then cc(y, z) = y for all x. As usual, this recursive equation determines a transformation T p = p’. We shall show that the minimal fixed point of T is the (1, 1)-ary functional H’ such that H’(y; a ) N v iff a is total, v = 0, and ( V ~ ) ( h ) a ( c c ( y , p ( w ) )N) 0.
First we set TH’ = H” and show that H’ is an extension of H”. If H”(y;a ) N v , then v = 0 and a is total, so it is sufficient to show that H’(y; a ) is defined. This is clearly the case if a(y) N 0, for cc(y,p(O)) = y. If a ( y ) $ 0, then from H”(y;a ) N 0 it follows that y is a sequence number, and H’(cc(y, <w>);a ) N 0 for every w , hence H’(y; a ) is defined. Next, we set Tp = p’, and assume p is an extension of p’, to prove that p is an extension of H’. If H‘(y;a) N 0 and y is not a sequence number, this means that a(y) N 0, hence p’(y;a) N 0, and p ( y ; a ) N 0. So we assume that y is a sequence number. To get a contradiction let us assume that p(y; a ) is not defined with value 0. This means a(y) $ 0 and p‘(y;a) is not defined with value 0, hence there is vo such that p(cc(y,
Chapter 16. Hyperenumeration
239
with value 0. This process continues indefinitely, so there is an infinite sequence 2 1 0 , . . . , ZI,, . . . such that a(cc(y,
where Q is in F d . Assume xg is a dual characteristic functional of Q which is T-computable. We get a partial characteristic functional $ p as follows:
This shows that P is p-computable in F.
0
Let P be a class of predicates. We set P h # = Phcg, and p h a = P h # d . The functionals in P h # are P-hyperenumeruble, and the predicates in Pha are Phyperarithmetical. If 3 is a class of functionals, the predicates in Fdhe are F-hyperenumerable, the functionals in F d h # are 3-hyperenumerable, and the predicates in Fdha are F-hyperarithmetical. In particular, the predicates in PRdhe are hyperenumerable, the functionals in PRdh# are hyperenumerable, and the predicates in PRdha are hyperarithmetical.
Theorem 16.5 Let P be a class of predicates such that PRd E P and which is closed under substitution with primitive recursive functions, distribution, conjunction, and disjunction. Then
(i) Ph# is closed under p-recursive operations.
(ii) P h a is closed under substitution with quasi-total P-hyperenumberable functionals, distribution, conjunction, disjunction, negation, and universal and existential bounded quantification.
L.E. Sanchis
240
(iii) P h a is closed under existential and universal unbounded quantification. To prove (i) we apply Theorem 13.4 to P h e , noting that the closure requirements follow from Theorem 16.2 and Theorem 16.3. Part (ii) follows from part (i) and Theorems 3.1, 3.3, and 4.7. To prove part (iii), assume a predicate P is obtained in the form PROOF.
where Q is in Pha. Let X Q be a dual characteristic functional of Q in P h # , and GQ the graph predicate of X Q . We introduce a dual characteristic functional x p as follows: x p ( z ;a)21 v G
((Vy)Gg(O,y, S; a)A v = 0) V ((3y)Gg(l, y, 2; a)A v = 1).
From the closure properties in Theorem 16.3 it follows that x p is in Ph#, hence P is in Pha. This proves closure under universal unbounded quantification. Closure under existential unbounded quantification follows using closure under negation. 0 EXAMPLE 16.5 Assume T is a class of functionals closed under primitive recursive operations. Then Theorem 16.5 applies to the class T d h # (the class of Fhyperenumerable functionals) and to the class Tdha (the class of F-hyperarithmetical predicates). In particular, the theorem applies to the classes PRdh# (the class of hyperenumerable functionals), and PRdha (the class of hyperarithmetical predicates).
16.6 Assume T is a class of functionals closed under p-recursive operations. Then Theorem 16.5 applies to the class F p h # and F p h a .
EXAMPLE
We complete this chapter with a few definitions involving predicates and classes of predicates. They will be useful in formulating several results in the next chapter. Let P and P' be (k,m)-ary predicates. We say that P' is a similar extension of P if P' is a boolean extension of P and P is similar to P'. The latter condition means that P ( z ;a)G P ' ( z ;a)when the a are total functions. We write P 2, P' to denote that P' is a similar extension of P . When m = 0 this means, of course, that P = PI. A relation of the same form was defined in Chapter 13 for functionals, and the two are strongly related. For example, i f f Es f' where f and f' are functionals,
Chapter 16. Hyperenumeration
24 1
then G j C_s G j l . On the other hand, the relation general does not imply P CS P'.
$p
cs $ p ,
(or
xp
Gs x p t )
in
This relation is preserved by conjunction and disjunction, but it is not preserved by negation. Hence, if P CS P' and Q CS Q', then P A Q CS P' A Q', and P V Q SS P' V Q'. The relation is also preserved by bounded, unbounded, and barred quantification. Furthermore, it is preserved by general (or unbarred) function quantification, for the range of these quantifiers includes only total functions. Let P and P' be classes of predicates. We say that P' is a similar extension of P if P C P', and whenever P' is a predicate in P' there is a predicate P in P such that P P'. We write P GSP' to denote that P' is a similar extension of P . Note that if P ES P',then Pe CS PL, P, CS PL, P i c GS P i e , Pg ESPk, and P# Ss PB. We denote by PS the class of all predicates that are similar extensions of predicates in P. Clearly, P CSPs, and if P c s PI, then P' C_S Ps.
Theorem 16.6 A s s u m e the class F is closed under primitive recursive operations.
Then Fdh#p = Fdhes.
PROOF. Assume the
(k,m)-ary predicate P is in the class Fdh#p, hence there is
a partial characteristic functional $ p which is in F d h # so G Q is~ in Fdhe. Let P'
be the predicate such that
P'(z; a ) It follows that P' is in Fdhe and P'
G q p ( O , 2; a).
Cs P , hence P
is in the class Tdhes.
Conversely, assume P is in the class Fdhes, so there is P' in the class F d h e and P' cs P . If we set
it follows that Fdh#p.
$p
is a partial characteristic functional of P in F d h # , hence P is in 0
L.E. Sanchis
242 EXERCISES
16.1 Let P be a class of predicates closed under substitution with primitive recursive functions and conjunction. Assume P R d E P. Prove that PS= Pgp. 16.2 Let P be a class of predicates and assume P R d c P , P is closed under conjunction, disjunction, and substitution with primitive recursive functions. Let P be a (k,m)-ary predicate. Prove the following conditions are equivalent: (a) P is P-hyperarithmetical.
(b) There are boolean monotonic P-hyperenumerable (k,m)-ary predicates * PI and P2, such that PI2 s P and P2 c~P . 16.3 Let P and P' be classes of predicates such that P Es P'. Prove that Pg
GS Pi.
16.4 Prove that if H'(cc(y, <w>); a) N 0 holds for all w , and y is a sequence number, then H'(y; a)N 0. 16.5 Let F be a class of functionals closed under recursive operations. Assume the functional E is F-computable. Prove that Fdh#s Fp#. 16.6 Let F be a class of functionals closed under basic operations. Assume PI is Fd-hyperenumerable, and P2 is Fp-hyperenumerable. Prove that PI v Pz is F'p-hyperenumerable.
16.7 Let F be a class of functionals closed under primitive recursive operations, and f a (k,m)-ary functional. Assume f is Td-hyperenumerable and quasi-total. Prove that f is in the class Fdha#.
Notes Hyperenumeration is an operation that is intermediate between number quantification and full function quantification. It can be argued that it is a predicative construction, and as such, relevant in the foundations of mathematics. We give here only a short outline to be used in the next chapter in the proof of Kleene's theorem on hyperarithmetical predicates. For a more extensive presentation, see Sanchis [27], Rogers [24], and Kleene [15]. The relation between enumeration and hyperenumeration is explored in Sanchis [25]. Applications to combinatory logic are given in Sanchis [26].
Chapter 17
Recursion in Normal Classes The main purpose of this chapter is to give a generalization of Corollary 13.5.2 in terms of hyperenumeration. More precisely, we want to determine conditions for a class 3 to satisfy the relation RC(3) cs PRdh#. This can be done in a fairly general context where we can conclude that RC(E) Es PRdh#, and from this it follows that RCd(E) = PRdha = the class of hyperarithmetical predicates. This is a classical result due to Kleene. Our proof of the above relation requires that a number of conditions be satisfied by the class 7 ,in particular that 3 be normal. In fact, we need this condition for just one application, namely, the selector theorem of Chapter 15. Let 3 be a class of functionals and U a basic 3-term in 2; a . We say that U is elemental if U does not contain occurrences of function variables. Note that this does not mean that the list a is empty. Rather, it means that no variable in the list a is used in the construction of U . From this it follows that only numerical functions from the class 3 are used in the construction of U . So U is a pure numerical expression which contains numerical functions, numerical constants, and numerical variables. Note that we do not require that the class 3 contain only numerical functions. On the other hand, in dealing with elemental basic T-terms, only the numerical functions in 3 are relevant. We proceed now to define analytic 3-terms in variables z;a . The definition does not imply any restriction on the class 3,but in applications we shall assume
243
L.E. Sanchis
244
that F is closed under primitive recursive operations and contains only quasi-total functionals. The definition involves five inductive rules AT 1 to AT 5, as follows:
AT 1: If Vl and V2 are elemental basic F-terms in variables x ; a and ai is a variable in the list a , then q ( V 1 ) = V2 and cri(V1) # V2 are analytic F-terms in 2; a . AT 2: If V1 . . . , Vk are elemental basic F-terms in x ; a , and Q is a k-ary numerical predicate in Fd, then Q(V1,.. . , vk) is an analytic F-term in x ; a . AT 3: If U1 and U2 are analytic F-terms in x ; a , then (Ul A U z ) and analytic F-terms in z ; a .
(Ul
V U z ) are
AT 4: If U is an analytic F-term in y , z ; a , then (Vy)U and ( 3 y ) U are analytic 3-terms in x ; a . AT 5: If U is an analytic F-term in x ; P , a , then (VP)U is an analytic 3-term in x ;a.
Clearly, the analytic F-terms are completely determined by the numerical functions in the class F. Still, in general we shall assume that F may contain nonnumerical functionals. Note that an analytic F-term may contain function variables, but they can enter the construction only via rule AT 1. Such variables can be bound later by rule AT 5. The basic terms occurring in an analytic F-term are either elemental, or of the form cr(V), where V is elemental. An analytic term represents a compromise where universal quantification over function variables is allowed, but strong restrictions are imposed on the use of such variables. Still, we shall see that these terms have a considerable expressive power. The semantics for the analytic terms is self-explanatory. We mention only that in rule AT 1 the terms are false if either cq(V1) or V2 is undefined. Similarly, the term in rule AT 2 is false if one of the terms Vl, . . . , v k is undefined. EXAMPLE
17.1 Consider the following two expressions in variables
+
(VP)PY)([Z P ( 4 Z ) ) l 11 = Y 1) ( V P ) ( ~ ~ ) ( ~ ~ J ) ( ~= % v) (ACP(v) X ( Z=) t A +
[Z + t,13
2 ;a:
= y + 1).
The first expression is not an analytic PR-term, but the second is. Note that the applications of equality correspond to two different rules: AT 1 (for a(.) = t~ and
Chapter 17. Recursion in Normal Classes
245
B(v) = z ) and AT 2 (for [x --t z , 13 = y + 1, where Q is the primitive recursive equality predicate). Note also that the two expressions are equivalent if a is a total function. If x # 0 and a(.) is undefined, then they are not equivalent.
A (k,m)-ary predicate P is F-analytic if there is an analytic 3-term U in variables z;Q such that P ( z ;a) U . The class of all F-analytic predicates is denoted by 3 a . Theorem 17.1 Assume the class F is closed under primitive recursive operations. Then,
(i) The class 3 a is closed under conjunction, disjunction, universal and existential unbounded quantification, and universal function quantification. (ii) The class F a contains all the numerical predicates in 3 d and is closed under distribution. (iii) The class F a is closed under substitution with numerical functions in the class
F. (iv) The class 3 a is closed under universal and existential bounded quantification. (v) The class F a is closed under existential barred quantification. PROOF. Parts (i) and (ii) are clear from the definitions. Part (iii) is not completely obvious because we are not assuming the numerical functions in the class 3are total, and the substitution of a non-total function in an elemental term may be defined. In general, we have a substitution
where Q is in the class 3 a and f i , . . .,f., are numerical functions in 3. This substitution can be expressed as
Part (iv) is clear, for bounded quantification can be expressed using unbounded quantification with conjunction, disjunction, and primitive recursive numerical predicates.
L.E. Sanchis
246
To complete the proof we consider part (v) where a predicate P is obtained by existential barred quantification in the form
P ( z ;a)= (VP)(~Y)Q(P(Y), z; a). An equivalent expression can be obtained as follows:
where SQ is a primitive recursive predicate such that SQ(y) holds if and only if 0 y = < X I , . . .,xn>,n2 0. A class F of functionals induces the class Fag which also contains functionals. Note that if F is closed under primitive recursive operations, then Fa = Fae,hence Fag = Faeg = Fa#. The functionals in the class Fag are called F-analytic. We show below that classes of the form Fa# satisfy important closure properties.
Corollary 17.1.1 Assume the class 3 is closed under primitive recursive operations. Then Fa# is closed under p-recursive operations. PROOF.
Immediate from Theorem 13.4 and the closure properties of Theorem 17.1.
Theorem 17.2 Assume the class F is closed under primitive recursive operations. Then Fa# is closed under functional substitution. PROOF.
Consider a substitution of the form:
where the functionals g, h l , . . . , ha are in the class Fa#.This means we can write
Chapter 17. Recursion in Normal Classes
247
We assume p = P I , . . . ,p3 and note that an occurrence of P; in Uo is either of the form Pi(V1) = V2 or of the form Pi(&) # V-. In each case the substitution of is equivalent to (Xy)hi(y,x; a ) for
= y A V2 = W) (3W)(3Y)(ui A VI = Y A VZ # w). (3~)(3y)(ui A
b1 '
So we obtain the graph predicate GI by performing these replacements in the term
uo .
0
EXAMPLE
17.2 The graph predicate of the functional E can be expressed as follows:
G E ( w ;a)
f
( ~ z ) ( c Y= ( ~0 )A (vy < z)a(y) # 0 A v = 0) = y 1 A w = 1).
V (b'z)(3y)(a(z)
+
It follows that the functional E is PR-analytic. 17.3 The graph predicate of the functional E' defined in Chapter 14 can be expressed as follows:
EXAMPLE
G E ( w ;a) f G E ( v ; a ) A (Vz)(3y)~~(z) = y, so E' is also PR-analytic. EXAMPLE 17.4 The graph predicate of the functional H defined in Chapter 16 is also PR-analytic. EXAMPLE 17.5 We prove later in this chapter that any functional which is recursive in E is PR-analytic.
Theorem 17.3 Assume the class 3 is closed under primitive recursive operalions and contains only quasi-total functionals. Then,
(i) If P ( x ;a) 3 U where U is an analytic 3 - t e r m in x;a which does not contain quantifiers, then P is in 3 d .
(ii) If U i s an analytic 3 - t e r m in x;a , then there is an analytic 3 - t e r m U' in y,x;P,a such that U (Vp)(3y)U', and U' does not contain quantifiers.
(iii) If P is an 3-analytic predicate, then P can be obtained b y existential barred quantification from a numerical predicate in 3 d .
L.E. Sanchis
248
The assumption that F contains only quasi-total functionals is too strong. We need only that the numerical functions in F are total. The proof of (i) is straightforward by induction on the construction of the term U , using Theorem 3.1 (i) and (ii), and Theorem 3.3 (ii). To prove part (ii) we perform a number of transformations on the term U , each of them producing a term equivalent to U . The final term will be of the form (Vp)(3y)U‘ where U’ does not contain quantifiers. The term U may contain unbounded quantifiers and universal function quantifiers. First, we show that universal unbounded quantifiers can be replaced by universal function quantifiers. In fact, given a term of the form (Vy)U’, this can be replaced by the equivalent term (Va)(3y)(a(O) = y A V ’ ) , where a is a new function variable. With this understanding, we assume U contains only existential unbounded quantifiers and universal function quantifiers. Since quantifiers can be exported over disjunction and conjunction, we assume U is in prenex normal form where all quantifiers precede a quantifier-free term. We show now that the prefix of the prenex normal term can be arranged in such a way that all universal function quantifiers precede the existential unbounded quantifiers. For this purpose it is sufficient to show that any combination (3z)(Va) in the prefix can be replaced by (Va)(3z). For the permutation to be valid we need to execute some substitution in the body of the term. The general situation can be described as follows:
PROOF.
(3z)(Va). . . z . . . a ( V )= V‘ . . . a ( W )# W ’ . . . with the understanding that the term may contain several occurrences of the function variable a. We execute the following transformation: (Va)(32). . .2... a ( < t , V > ) = V’ . . . a ( < t ,W > ) # W’. .. It is clear that if the original expression holds, then the new expression also holds. On the other hand, if the original expression fails it means that for every z there is a function a, that falsifies the body of the term. If we set a ( y ) = a[,ll([y]z) we obtain a function a for which there is no I that satisfies the body of the new expression. So both expressions are equivalent. Note that the new expression after the permutation of quantifiers is again an analytic F-term. We have now an analytic F-term in prenex normal form where all universal function quantifiers precede the existential unbounded quantifiers. We proceed to
Chapter 17. Recursion in Normal Classes
249
contract all the universal function quantifiers into just one quantifier followed by a number of existential unbounded quantifiers. To explain the construction we assume there are two function variables, each occurring twice in the body. The given term has the form:
By contracting the function quantifiers we get the expression:
At this stage the term U is in prenex normal form with one function quantifier preceding a sequence of existential unbounded quantifiers: ( V P ) ( 3 V I ) . * . ( 3 v m ) . . .Ul . . .Vz * . . o m . ..
We contract the existential quantifiers as follows: (VP)(3V). . . [ V ] 1 . . .[V]Z... [Vim * ..
This completes the proof of part (ii). To prove (iii) we assume the predicate P can be expressed in the form P(x;a ) (VB)(3v)U’, where U’is an analytic F-term which contains no quantifier, and execute a number of substitutions with primitive recursive functions until we obtain a term U”. Here we use again the notation d(y, z) = [y]$ and substitute d(d(y, 0)O) for v in U’. We call this term Uo. We list all occurrences of p in UO,which are of the form P ( K ) = V;, . . . ,P(V8)= V:,P(Wl) #
+
W ; ,. . . , p (W,) # W,!, and replace P(&) = 4’with d(y,K 1) = K‘,i = 1,.‘.,S, and p(Wj) # Wj’ with d(y, W, 1) # W i , j = 1,. . . , r . This term we call U1. The term U” is a conjunction of the form
+
ui A vi < d(y, 0) A . . . A < d(y, 0) A Wi < d(y, 0) A .. . A W, < d(y,O). Noting that U” is an analytic F-term in y,x;a , we introduce a predicate Q such that Q(y, s;a )
U”.
L.E. Sanchis
250
T h e predicate Q is T-analytic. Furthermore, since U“ contains no quantifiers, it follows that is in the class T d . We prove now t h a t
, there is v such t h a t U’ holds. Since U’ Assume P ( z ; a ) holds. For a given O contains no quantifier the evaluation of U‘ requires a finite number of values of p, which can be encoded in a number P(y0) for some yo. We can assume also t h a t v; < y0,i = 1 , . . . , s , and Wj < yo, j = 1,.. .,P. And we can assume that d(y0,O) = v . In these conditions the substitution of P(y0) for y in U” holds, since
+
+
YO), 0)O) = d(yo,O) = 21, @(yo), K 1) = P(K), a n d @(YO), Wj 1) = p(Wj). This proves t h a t for every p there is y such t h a t &(p(y),z; a)holds. Conversely, assume that (Vp)(3y)Q(P(y),z; a).Hence, given p, there is yo such t h a t U” holds when we set y = p(y0). If we take v = d(y0,O) it is clear t h a t U’ 0 holds. Hence for every P there is v such that U’ holds, so P ( z ;a)holds. Corollary 17.3.1 Assume the class 7 i s closed under primitive recursive operations and contains only quasi-total functionals. Then E Tdhe, and Fa# 5 Tdh#. PROOF. Immediate from Theorem 17.3.
0
A class of the form Fahas strong closure properties t h a t are simply derived from the rules that are allowed in t h e construction of analytic T-terms. In particular, closure under function quantification is a very powerful construction, although u p t o this point we have had no opportunity to use it. Now we shall show t h a t closure under universal function quantification implies closure under a form of non-finitary induction. We have used non-finitary induction before in this work, to define the reductional semantics in Chapter 10. T h e treatment there was t o some extent informal, and we assumed the reader was familiar with this type of construction, in particular with proofs by induction. Here we must be more cautious, for we want to show that whenevei. a predicate is introduced by an induction involving analytic terms, then the predicate is analytic. To carry out the proof in complete generality we have t o provide an adequate theory of induction. We derive a theory of induction from the fixed point Theorem 1.2. In this way we look a t recursion and induction as two aspects of the same phenomenon. Still, there
Chapter 17. Recursion in Normal Classes
251
are important differences that are not discussed here, for the domain implicit in a definition by induction is a complete lattice, and this has substantial consequences. We start by extending the system of analytic 3-terms and define inductive analytic F-terms in variables z;a . This requires the introduction of a new uninterpreted predicate symbol I’, of some fixed arity, say k. We use I’ as a k-ary numerical predicate, but the induction introduces rather a (k, m)-ary predicate. We define inductive analytic F-terms in variables z;a by six inductive rules IAT 1 to IAT 6. Rules IAT 1 to IAT 5 are derived from rules AT 1 to AT 5, by changing “analytic” to “inductive analytic.” Rule IAT 6 is as follows: IAT 6: If V1, . . . , V k are elemental basic F-terms in z;a , then I’(V1,. inductive analytic F-term in z; a .
,,
, Vk) is an
An inductive analytic F-term U in variables z;a is regular if the arity of z is also k, so the expression r(z)is well formed. If U is a regular inductive analytic F-term in z;a we introduce an inductive condition in the form If U then
ra(z).
The meaning of this condition is determined in the following way. If we fix the functions a we can define a transformation Ta(r)= I’L, where I’ and I?& are k-ary numerical predicates and I’&(z) G U . Note that here I‘ denotes a k-ary numerical predicate independent of the functions a,and I’L denotes also a k-ary numerical predicate which is dependent on I’ and a . For each a the transformation Ta is boolean monotonic on the domain PREk of all k-ary numerical predicates, so there is a minimal fixed point I’a which satisfies the inductive condition and is minimal with that property. This means that if we put U a the result of replacing I’ in U with then the relation
ra,
If Ua then
ra(z)
holds for all values of z.The mininiality condition means that if predicate which satisfies the condition
I” is another k-ary
If Ub, then P(z), where Ub, is obtained by replacing I’ with I“, then I” is a boolean extension of ra. We complete the definition by setting r(z;a ) G I’a(z). We say that the (k,m)ary predicate r is specified by F-analytic induction with basis the term U .
L.E. Sanchis
252
Theorem 17.4 If r i s a ( k , m ) - a r y predicate specified by 3-analytic induction, and F is closed under primitive recursive operations, then r is F-analytic. PROOF.
We consider an inductive condition of the form If U then
ra(z)
and change U to U' by replacing all variables z with new variables y, and replacing all occurrences of r(V1,. . ., Vk) with p(
P ( z ;a) (Vp)(p(
# 0)).
Clearly, the predicate P is F-analytic. We shall show that P = r is the minimal solution of the inductive condition. P ( z ; a ) holds.. Let /3 be the We fix the functions a and assume Pa(.) function such that:
From Pa(.) it follows that I'a(z)holds, for otherwise there are y such that U' and I'a(y1, . . ., y k ) , and this is impossible because ra is a solution of the specification. Conversely, if ra(z)holds, let p be an arbitrary function and assume that whenever U' holds, then p(
-
it follows that r&satisfies the inductive condition, so I'd is a boolean extension of ra. Since ra(z) holds, it follows that r&(z)also holds, hence p(
Chapter 17. Recursion in Normal Classes
253
The preceding result shows that whenever F is closed under primitive recursive operations, then the class Fa is closed under F-analytic induction. We prove next that the class Fa# is closed under recursive operations. To prove this relation we must assume again that the class F is closed under primitive recursive operations. Note that we know already that Fa# is closed under p-recursive operations and functional substitution. Theorem 17.5 If 3 is closed under primitive recursive operations, then closed under recursive operalions.
Fa# is
It is sufficient to prove that if 3‘ is a finite subset of Fa#,then RC(7’) is also a subset of .Fa#. This will follow if we show that the universal interpreter for RC(F’) defined in Chapter 12 is in the class .’Fa#. Essentially, we transform the recursive specification of the interpreter in an F-analytic induction of the graph predicate and apply Theorem 17.4. To simplify the presentation we shall assume that the class F’contains exactly one (1, 1)-ary functional which, departing from the notation in Chapter 12, we denote with the letter f . We want to prove that the functional Qrn is in the class Fa# for every m 2 0. In the same spirit we assume that m = 1 and consider only the functional cP1. Since this is a (1,1)-ary functional the graph predicate is (2,l)-ary, and it is represented by the 2-ary symbol r. We must write an inductive condition PROOF.
If U then r a ( v ,z ) , where U is an inductive analytic F-term in v , z ; a . Actually, the term U is a disjunction of nine subterms U1,. . . , Us,each derived from the corresponding equation in the recursive specification of @ I . The derivation is in most cases trivial. Only in the case of the term U S ,derived from equation RD 8, must we refine the analysis. We start with equation RD 1 where the term U1 is rpi(z, 0) = 0 A v = d ( z , 2, d(z, 1,2)).
The translation of equation RD 2 into the term Uz is entirely similar, although here we impose rp;(z,2) = 0. The translation of equation RD 3 is the following analytic term U3:
254
L.E. Sanchis
The translations of equations RD 4 and RD 7 into terms U4 and U7 are similar. The term Us which translates equation RD 5 is the only one that explicitly involves the variable a , and it is
In the case of equation RD 6 we note that the only purpose of the bounded product is to make sure the terms are defined, and here we express the condition using the universal bounded quantifier (which is, in fact, an abbreviation of a combination using the universal unbounded quantifier with disjunction and a primitive recursive numerical predicate). The term Us is a conjunction of e q l ( z , 6) = 0 and the term (VW
< d(z,1,0))(3Y)(r(Y,
92(2, w))A q v , g3(z))).
Equation RD 9 translates into the term Us, which is a conjunction of rp:(z, 9) = 0 and the term
Finally, we consider equation RD 8 where the given functional f is F-analytic, so there is an analytic F-term U’ in v, x;/3 such that
G J ( v , X ;p)
U’
We know the equation requires the substitution of (Xy)@1(g7(zIy); a ) for p in the term U’.Since the occurrences of /3 in U’ are of the form p ( V ) = V‘ or p ( V ) # V’, it is sufficient to replace these expressions with
v)) v’
(gw)(r(W, g7(2, A = w) (3w)(r(W, g7(z, V ) )A V’ # w), depending on the type of expression. We call U” the term obtained by executing these replacements in U’ and set the term Us as r g i ( z , 1) = 0 A ( 3 z ) ( r ( T , g i ( z ,d ( z , 1,3))) A U”).
This completes the description of the analytic terms U1,. . . , Us, so we put U = U1 V . . . V Us and write the inductive condition
If U , then r 0 ( v , 2).
Chapter 17. Recursion an Normal Classes
255
The minimal solution of this condition is a (2,l)-ary predicate r, and we claim that r =G~,. To prove the claim we note that Gal satisfies clearly the inductive condition, so it is a solution, and this means that Gal is an extension of I?. It follows that r is single-valued and there is a ( l , l ) - a r y functional cb’ such that r = Get. We must prove that cb‘ is an extension of cb1. We recall that cb1 is the minimal fixed point of a transformation T induced by the recursive equations. We set Tcb‘ = cb”, and it is sufficient to prove that cb’ is an extension of cb”. To prove this relation we must show that whenever cP”(z; a) N v, then cb’(z; a) N v by considering all possible cases in the specification of cP” by the equations RD 1 to RD 9. We discuss a few cases. The general idea is that whenever cP”(z;a)N v holds by equation RD i, then the term Ui holds, hence r a ( v , z ) also holds. This a)N v. means, of course, that a’(%; If @’’(z;a)N v by equation RD 1 we have rp:(z,O) = 0, and also v = d ( z , 2, d(z, 1,2)), hence the term U1 holds. If W ’ ( z ; a ) N v by equation RD 6, then cb’(gz(z,i);a) is defined for every i < d ( z , l , O ) , and cb‘(gg(z); a) 2: v. Since we are assuming r = Gat, it follows that equation us holds. If W ( z ;a)N v by equation RD 8, f(cP’(gl(z, dl(t,1,3));a);(Xy)cb’(g,(z, y); a)) N v. Since r = Gat, there is an z such that I ’ ( z , g l ( z , d ( z , 1 , 3 ) ) ; a ) holds, and f ( z ; a ) N v , where p = (Xy)cb’(gT(z,y);a). It follows that U’ holds with this 0 particular p, hence U” holds. We conclude that Us holds. Corollary 17.5.1 Iff is recursive in E, then it is PR-analytic.
From Example 17.2 we know that E is in the class PRa#, hence from 0 Theorem 17.5 it follows that f is also in the class PRB#. PROOF.
Theorem 17.6 Assume the class 3’is normal, 3 contains only quasi-total functionals, 3’ C PRa#(F), and P R ( 3 ) E RC(3’). Then,
L.E. Sanchis
256
From Theorem 17.5 we know that PRa#(F) is closed under recursive operations, hence RC(F’) PRa#(F), and from Corollary 17.3.1 we know that PRdh#(F). It follows that RC(F‘) 2 PRdh#(F). To complete the PRa#(F) proof of (i), assume f is a functional in the class PRdh#(F), hence G j is a predicate in PRdhe(F). Noting that PRdhe(F) RCdhe(F’) follows from the assumptions, RCp(F’) follows from Corollary 16.4.1, it follows that G f is in and RCdhe(F’) the class RCp(F‘). Since RC(F’) has the p-selector property there is a functional f’ in RC(F’) which is a selector for G,. It follows that f’ Es f . This completes the proof of (i). Part (ii) follows immediatelyfrom (i), noting the definition PRdha(F) = PRdh#d (F).To prove (iii) we note that from (i) it follows that RCp(F’) = PRdh#p(F), 0 and we have also PRdh#p(F) = PRdhes(F) by Theorem 16.6. PROOF.
s
c
c
Corollary 17.6.1 Let 3 be a class which contains only quasi-total funclionals, and F RC(E). Then,
c
(iii) RCp(E) = PRdhes(F) We apply Theorem 17.6 to 3’ = {E’}, which is a normal class, noting that RC(E) = RC(E’). 0
PROOF.
EXAMPLE
1 7 . 6 If we apply Corollary 17.6.1 with 3 = 0 we get the following rela-
tions:
EXAMPLE
relations:
17.7 If we apply Corollary 17.6.1 with F = {E} we get the following
Chapter 17. Recursion in Normal Classes
257
EXERCISES
17.1 Prove explicitly (i.e., without using Corollary 17.5.1) that the functional H is PR-analytic.
17.2 Explain where the requirement that all numerical functions in 7 are total is necessary in the proof of Theorem 17.3. 17.3 Complete the proof of Theorem 17.3 (ii) and show that the replacement of (31)(Va) by (Vcr)(3z) in the prefix produces an equivalent term. 17.4 Let P be an 7-analytic predicate, where 7 is a class of functionals. Prove that P is boolean monotonic.
17.5 Consider the following (2,l)-ary predicate P such that
P ( v ,t;a )
21,. . . , zn, n > 1, such that = v , and a ( q ) = q + l for 1 5 i < n.
There is a sequence I
= 11,
I,
Show that P can be specified by PR-analytic induction.
The crucial result in this chapter is Theorem 17.6, particularly in the form given in Example 17.6 where it is shown that recursion in the functional E is equivalent to hyperenumeration. This result was proved in Kleene [16]. Here we follow the approach of Hinman [lo]. The main tool in the proof is the restriction to PRanalytic predicates, which allows for considerable latitude in the use of universal function quantification and at the same time imposes rigid conditions in the use of function variables, which are allowed only via application. The conclusion of this combination is that PR-analytic terms can be expressed via hyperenumeration. The transition from recursion to induction, and vice versa, is a peculiar situation that we have found before in the discussion of reductional semantics. In general, a recursive specification can be translated into an inductive specification, and in many cases inductive specification can be seen to be essentially recursive. Still, we cannot identify recursion and induction, for the former is deterministic, so belongs properly to computability theory, while the latter is non-deterministic and belongs properly to definability theory.
258
L.E. Sanchis
For a general theory of inductive definability, see Moschovakis [21] and Hinman [lo]. The presentation in Sanchis [27] is concerned primarily with the formalization of proofs by induction.
Appendix
Recursion and Church’s Thesis Church’s thesis has been discussed a few times in this work, mainly in Chapter 6, where the original standard form was formulated, and in Chapter 8, where a more general extended form was introduced. We want to give here a more comprehensive presentation, with emphasis on the role of recursion. It is a well known situation that Church’s thesis is not a mathematicalstatement, so it cannot be proved in the usual way. This applies also to the extended form introduced in Chapter 8. Essentially, the thesis relates a general but informal notion of computable function (or functional) to another notion which is precise and formal. The thesis asserts that any instance of the informal notion can be reduced to an instance of the formal notion. If this is the case, and Church’s thesis has no precise meaning and cannot be proved, we should ask what is the reason for the inclusion in this work. In fact, the thesis is never applied in a formal sense, and could be excluded from the text without affecting the remaining results. Our position is that Church’s thesis is relevant for the foundations of mathematics, for it provides a formal description of a fundamental type of mathematical activity. There are other theories that attempt to formalize different realms of mathematical activity. In particular, set theory attempts a universal formalization. There is another dimension where Church’s thesis is relevant, namely, in the domain of practical computing. By using Church’s thesis we can prove that some problems are algorithmically unsolvable. Obviously, this information can be critical in some real world situations. 259
260
I;. E. Sanchas
We are interested here in the foundational approach to Church’s thesis, particularly in the role of recursion in computability theory. This theory was identified from the beginning as a theory of recursive functions and functionals, so we may expect that the role of recursion must be critical, even at the lowest level which is concerned only with the computation of numerical functions. We shall deal first with this level, noting the peculiarity that recursion is not explicitly mentioned in the standard Church’s thesis. The standard form of Church’s thesis usually applies to the computation of numerical functions, including the relativization t o a given class F of functions. In Chapter 6 the thesis is given a more general application, for it covers the computation of functionals relative to a class F of functionals. Actually, only some types of computations are considered, namely, the explicit computations. Since explicit computations are non-recursive, it appears that recursion is, in fact, excluded from the standard Church’s thesis. The standard Church’s thesis reduces explicit computations relative to a class F of functionals to p-recursive operations relative t o the class F.Note that p-recursive operations essentially involve primitive recursion and unbounded minimalization. At this stage we may expect objections to be raised, in the sense that the restriction to explicit algorithms is arbitrary, and it is not a part of the usual formulation of Church’s thesis (for example, as given in Kleene [14]). We answer that the restriction is meaningful, for in dealing with computable functionals in general, the thesis is not true unless the restriction to explicit algorithms is invoked. In fact, it is fairly clear that primitive recursion and unbounded minimalization are not sufficient for the reduction of non-explicit functional computations. At the numerical level, where Church’s thesis is concerned with the computation of numerical functions, the situation appears to be different. The thesis is usually asserted for computations in general, and recursive computations are not explicitly excluded (see again Kleene [14]). It appears to us that some amount of ambiguity has been generated on this matter, which is harmless a t the numerical level, but may be confusing a t a higher level. We note first that although we cannot give a formal proof of Church’s thesis, there are some arguments that make it extremely convincing. In particular, a crucial argument is the existence of a canonical procedure where a given computation can be described in terms of primitive recursion and unbounded minimalization. In this
Appendix
26 1
procedure, which is explained in Chapter 6, the computation itself (as a sequence of steps) is expressed by primitive recursion, and the determination of the input for a halting computation is expressed by unbounded minimalization. The existence of this canonical reduction is in our opinion a fundamental element in the formulation of the standard Church’s thesis. On the other hand, it is obvious that the procedure works properly only in dealing with explicit computations. From this point of view it appears that the restriction to explicit computations is an implicit part of the standard Church’s thesis. This means that, in principle, recursive computations are excluded from the thesis. The catch is that, in practice, recursive computations can be reduced to explicit computations, so they are actually in the scope of the thesis. In fact, a general argument can be given in the sense that such a reduction is always possible, as explained in Example 6.3. This argument applies only to special forms of recursion where relativized functionals are involved, but it is fairly general for numerical functions. It appears entirely possible to give a more general formulation of the standard Church’s thesis where recursive algorithms of some form can be reduced to primitive recursion and unbounded minimalization. In the presence of the full notion of recursive algorithms given in Chapter 8, which includes functional substitution, such a formulation would be mostly negative. The full notion provides an adequate frame where special forms of recursion can be reduced via the extended Church’s thesis. For these reasons we have formulated the standard Church’s thesis in terms of explicit computations, and reserved the analysis of recursive computations to the extended Church’s thesis. Concerning the extended Church’s thesis of Chapter 8, the situation is quite different. Here we deal with recursive algorithms which are characterized via functional recursion. Recursion, which was not a part of the standard thesis, now permeates both the computational process and the mathematical formalization. We note first that the formulation of recursive algorithms given in Chapter 8, essentially via direct and indirect calls, is strongly conservative. The main purpose there was to outline a structure where computations were transparent enough, and at the same time sufficiently strong for the computation of some functionals, particularly the interpreter of Chapter 12,and the preorder functional of Chapter 15. Some possible extensions-for example, allowing functional substitution in direct
262
L . E. Sanchis
calls-were excluded from the model, as we found that the execution of such calls offered some difficulties. We wanted to have a model that was convincing, in terms of computability, and sufficiently general for the formulation of Church’s thesis. This means that some extensions of the model are possible, within the frame given by functional recursion. In particular, the formalism of Chapter 9, via the lambda calculus, provides a generous structure for the definition of computable functionals. From this structure, it appears feasible to derive a more comprehensive model for recursive algorithms. The extended Church’s thesis provides a mathematical characterization where recursive algorithms are reduced to recursive operations. The formalization of functional recursion requires the application of Theorem 1.2, which depends strongly on the axiom of set theory. We follow here the traditional approach, which we did not want to question in the text. At this stage we would like to formulate some qualms, and suggest that dependence on impredicative set theory can be avoided. T h e point we want to make is that the extended Church’s thesis proposes a char-
acterization of computational processes, which are intrinsically operational. This being the case we should expect the characterization to be free from extreme set theoretical assumptions. The characterization given in Chapter 8 involves functional recursion, which depends on Theorem 1.2, hence on transfinite recursion. The proof of the latter usually requires strong set theoretical axioms. We do not propose to question here the validity of set theory. We complain only that since computability is essentially operational we should look for an operational mathematical characterization. On the other hand, we cannot help mentioning that many persons have raised questions about the significance and validity of the axioms of set theory. In a number of cases such questions do not originate from an ideological commitment to an intuitionistic philosophy of mathematics. The extended Church’s thesis involves recursive algorithms, and also functional recursion. In both situations we invoke recursion. Apparently, in both cases, the same notibn of recursion is involved. Still, in the case of recursive algorithms recursion enters as an operational structure, and in the case of functional recursion as a set theoretical construction. We propose a more restrictive frame which is essentially operational and covers both recursive algorithms and functional recursion. The basic approach w a s already clear in the discussion of recursive algorithms, which are obtained by adding recursive calls to explicit algorithms. The latter
263
Appendax
are characterized via the standard Church’s thesis as finitary processes determined by formal rules. Obviously, we can adjoin recursive calls to non-finitary processes determined by arbitrary rules. The validity of such calls is not affected by the nature of the underlying processes, and as long as these are free from strong set theoretical assumptions we can claim that the adjoining of recursion does not involve further set theoretical commitments. We understand that the preceding claim is controversial, and open to serious objections. Still, we do not think the claim is more controversial than the usual separation and replacement axioms in set theory. At any rate, we give a short outline of the manner in which we think these ideas should be developed. Let U be an expression or program that defines a process that can be performed with an input denoted by X. This process is well defined in the context of some mathematical principles and definitions, and it is not assumed to be finitary. For example, it may involve the evaluation of quantifiers ranging over infinite sets. Being a process, it may halt or it may continue indefinitely. In the first case some output is produced. If the process does not halt, this is a purely negative situation that is never available during the process. In the conditions described above we say that U explicitly defines an operation f such that
f ( X ) = u, which means that f ( X ) is defined if and only if the process defined by U halts with input X , and the value of f ( X ) is the output of such a process. We can see that the preceding assumptions force us to deal with partially defined operations. In fact, this is a characteristic feature of operational mathematics. Note that we do not advance any assumption in the sense that f is being computed by the process. To have a computation the process should be finitary, and this is not one of our assumptions. Concerning the process itself, we shall say only that we assume it consists of a number of sub-processes, even an infinite number, and each one of the sub-processes may generate new sub-sub-processes, etc. In general, for a process to halt and produce output it will be necessary that some of the sub-processes halt, but not necessarily all of them. If we arrange this structure in the form of a tree we shall find that the process may halt even if some branches of the tree are infinite, which corresponds to partial non-halting processes. We can eliminate those branches, but
L . E. Sanchis
264
only by looking at the process as a complete object. In this way we obtain a tree where all the branches are finite. The next step is familiar from the theory of recursion. We may allow the symbol f to occur in the expression U , and write the recursive equation
f ( X )N
u.
The process to evaluate f ( X ) in this situation is the normal process defined by U , with the understanding that calls to f inside U are evaluated by the same procedure using U again with the input determined by the call. In these conditions we say that the operation f is recursively defined by U . In fact the operation f defined in this way satisfies the equation above, so f ( X ) N U holds for all values of X , as long as f is the operation defined by the recursion. In practice we need more, namely, that f is the minimal operation that satisfies the equation. To prove this we must assume that the expression U is monotonic in f, which means simply that the more defined is f , then the more defined is U . The proof uses a form of induction given by the halting derivation tree explained above. Clearly, a considerable amount of work will be necessary to transform these rough ideas into a workable structure. At this stage we want only to make clear that the theory of recursive functionals is by no means committed to a rigid impredicative system of set theory.
References [l] Barwise, K. J . Handbook of Mathematical Logic. Amsterdam: North Holland (1977). [2] Crossley, J. N. Sets, Models and Recursion Theory (Proceedings of the Summer School in Mathematical Logic and Tenth Logic Colloquium, Leicester 1964, editor). Amsterdam: North Holland (1967). [3] Fenstad, J. E., Gandy, R. O., Sacks, G. E. Generalized Recursion Theory I1 (Proceedings of the 1977 Oslo Symposium, editors). Amsterdam: North Holland (1978). [4] Fenstad, J. E. General Recursion Theory. Berlin, Heidelberg, New York: Springer Verlag (1980). [5] Gandy, R. 0. Computable functionals of finite type I , in Crossley (1967), 202-242. [6] Gandy, R. 0. General recursive functionals of finite t y p e and hierarchies offunclions, Ann. Fac. Sci. Univ. Clermont Ferrand 35:5-24 (1967). [7] Grilliot, T. J . O n eflectively discontinuous type-& objects, Jour. Symb. Log. 36:245-248 (1971). [8] Heyting, A. Constructivity in Mathematics (Proceedings of the Colloquium held at Amsterdam 1957, editor). Amsterdam: North Holland (1959). [9] Hindley, J . R., and Seldin, J. P. Introduction to Combinators and A-Calculus. Cambridge: Cambridge University Press (1986). 265
L.E. Sanchis
266
[lo] Hinman, P. G. Recursion-Theoretic Hierarchies. Berlin, Heidelberg,
New York: Springer Verlag (1978). [ll] Hinman, P. G . Hierarchies of eflective descriptive set theory, Trans.
Amer. Math. SOC.142:lll-140 (1969).
1121 Hinman, P. G . Degrees of continuous functionals, Jour. Symb. Log. 38:393-395 (1973). [13] Kechris, A. S., Moschovakis, Y. N . Recursion in higher types, in Barwise (1977), 681-737. [I41 Kleene, S. C. Introduction to Metamathematics. Amsterdam: North Holland; Groningen: P. Noordhoff New York: van Nostrand Co. (1952). [15] Kleene, S. C. On the forms of the predicates in the theory of constructive ordinals (second paper) Amer. J. Math (1955), 77:405-428. [16] Kleene, S. C. Recursive functionals and quantifiers offinite type I, Trans. Amer. Math. SOC.(1959), 61:193-213. [17] Kleene, S. C. Countable Functionals, in Heyting, (1959), 81-100. [18] Kleene, S. C. Recursive functionals and quantifiers of finite type revisited I, in Fenstad-Gandy-Sacks (1978), 185-222. [I91 Kreisel, G. Interpretation of Analysis b y means of functionals offinite type, in Heyting (1959), 101-128. [20] Moldestad, J. Computations on Higher-Types, Lecture Notes in Mathematics 574. Berlin, Heidelberg, New York: Springer Verlag (1977). [21] Moschovakis, Y. N. Elementary Induction on Abstract Structures. Amsterdam: North Holland (1974). [22] Norman, D. Recursion on the Countable Functionals, Lecture Notes in Mathematics 811. Berlin, Heidelberg, New York: Springer-Verlag (1980). [23] Platek, R. A. Foundations of Recursion Theory, Ph. D. thesis and supplement, Stanford University (1966).
REFERENCES
267
[24] Rogers, H . , J r . Theory of Recursive Functions and Effective Computability. New York: McGraw-Hill (1967). [25] Sanchis, L. E. Hyperenumeration reducibility, Notre Dame Journal of Formal Logic (1978), 19:405-415. [26] Sanchis, L. E. Reducibilities i n t w o models for combinatory logic, Jour. Symb. Log., (1979), 44:221-234. [27] Sanchis, L. E. Reflexive Structures. An Introduction to Computability Theory. Berlin, Heidelberg, New York: Springer-Verlag (1988). [28] Tourlakis, G . J . Computability. Reston: Reston Publishing (1984). [29] Tuguk, T. Predicates recursive i n a t y p e - 2 object and KIeene Hierarchies, Comment. Math. Univ. St. Paul (1960), 16:115-127.
This Page Intentionally Left Blank
Index Abstraction, 161 Algorithm, 86, 181 deterministic, 74 explicit, 50, 86 recursive, 110 Analytic, 243 Anti-symmetric, 5 Application, 1 functional, 37 Assignment, 129 Basic, 37 functional, 37 operation, 39 primitive recursion, 52 recursive term, 69 term, 47 Boolean, 20 values, 20 extension, 23 monotonic, 23 Bottom, 6 Bounded, 56 minimalization, 58 product, 57 quantification, 60 sum, 56
Call, 111 direct, 113 indirect, 114 Cartesian product, 19 Cases, 38 definition, 38 general, 40 Characteristic functional, 25,35 dual, 25, 35 partial, 25, 35 Church’s thesis, 67, 88 Closed, 128 Coenumerable, 193 Cohyperenumerable, 236 Complete, 17, 229 Computable, 36 recursively, 117 Computation, 86, 110 rules, 86, 110 Condition, 4 inductive, 251 single-valued, 4 total, 4 Configuration, 86, 110 Conjunction, 21, 24 Consistent, 7, 172, 227 set, 7 Constant functional, 37
269
270
Continuous, 206 Cover, 142 Definable, 136 formally, 136 Defined, 1 mapping, 1 well, 4 Definition, 3 mapping, 3 predicate, 26 Deflector, 210 Denotation, 129 Discontinuous, 209 effectively, 213 Discrete, 5 poset, 5 Disjunction, 21,24 Distribution, 38 predicate, 42 Domain, 8 Dual, 26, 35 Effectively discontinuous, 213 Elemental, 243 Enumerable, 193, 197 Existential quantification, 19 barred, 234 bounded, 50 functional, 233 unbounded, 190 Explicit, 3 algorithm, 50 specification, 3, 50 Extension, 4
L. E. Sanchis boolean, 23 mapping, 4 Factorization, 209 Fenstad, J. E., 14, 170 Fixed point, 9 Formalization, 125 closed, 128 language, 126 linear, 128 regular, 128 term, 126 variable, 126 Function, 30 number encoding, 59 number decoding, 59 Functional, 16, 30 application, 37 characteristic, 26 complete, 17 constant, 37 continuous, 206 discontinuous, 209 effectively discontinuous, 213 preorder, 165 primitive recursive, 54 projection, 37 quasi-total, 17, 55 recursive, 110 similar, 18 singular, 18 successor, 5 1 weakly normal, 213 Gandy, R. O., 124, 232
Index
Graph predicate, 26, 35 Greatest lower bound, 8 Grilliot, T. J . , 205, 206, 211, 212, 217 Hindley, J . R., 139, 156 Hinman, P. G., 14, 45, 170, 187, 217, 232, 258 Hyperarithmetical, 239 Hyperenumerable, 235, 239 Inconsistent, 7 Index, 159, 174 Induction, 251 Inductive, 251 Interpreter, 158 Intersection, 34 Jump, 184 Kechris, A. S., 108, 124 Kleene, S. C., 45, 95, 187, 200, 217, 242, 258, 260 Kreisel, G., 217 Least upper bound, 7 Linear, 128 Lower bound, 6 greatest, 8 Machine, 111 Mapping, 1 assignment, 129 defined, 1 definition, 3 monotonic, 15
271 partial, 2 specification, 2 total, 2 undefined, 1 Maximal, 6 Minimal fixed point, 10 Minimalization, 58, 68 bounded, 58 unbounded, 68 Moldestad, J., 124 Monotonic, 15 boolean, 23 extension, 23 Moschovakis, Y. N., 108, 124, 258 Negation, 21, 24 Normal, 231 weakly, 213 Norman, D., 217 Numerical, 30 function, 30 predicate, 34 substitution, 37, 40 Operations, 39 basic, 39 p-recursive, 68 primitive recursive, 52 recursive, 110 Oracle, 112 Partial characteristic functional, 25, 35 Partial ordered set, 5 Partial ordering, 5 Platek, R. A,, 124
272 Point, 9 minimal fixed, 9 Polish normal form, 75 Poset, 5 discrete, 5 Predicate, 22, 33 coenumerable, 193 distribution, 42 enumerable, 193 numerical, 34 partially recursive, 192 primitive recursive, 192 recursive, 192 Prefix, 127 p-prefix, 127 A-prefix, 127 Preorder functional, 165 Preordered, 168 Prime number enumeration, 58 Primitive recursion, 51 basic, 52 Projection functional, 37 Quantifier, 21 barred, 234 bounded, 60 unbounded, 190 Quasi-similar, 153 Quasi-total, 17 Range, 27 Recursion, 51 basic, 71 functional, 102 operational, 110
L. E. Sanchis primitive, 51 simultaneous, 106 Recursive, 69 algorithm, 110 call, 77 functional, 110 machine, 112 operation, 110 Represent at ion, 172 Reflexive structure, 158 Regular, 6 element, 6 poset, 6 set, 149 term, 101 Restriction assumption, 145 Rogers, H., 242 Sanchis, L. E., 13, 29, 47, 58, 67, 69, 71, 84, 89, 95, 162, 167, 170, 187, 189, 232, 258 Seldin, J. P., 139, 156 Selector property, 168 Semantics, 127 reductional, 127 structural, 127, 131 Similar, 18 extension, 191, 240 Single-valued, 4 Singular, 17 Specification, 2 explicit, 3 mapping, 2 relational, 3 Stack, 74
Index
algorithm, 74 Structure, 158 Substitution, 37 formal, 134 free, 134 functional, 62 numerical, 37 predicate, 43 Support, 113 System, 110 Term, 47 analytic, 243 basic, 47 elemental, 243 functional, 98 inductive, 251 regular, 251 TOP, 6 Total, 2 condition, 4 mapping, 2 Tourlakis, G. J., 45, 124, 187 Transformation, 9, 70 TuguC, T., 187
273 Tuples, 31 Type-0, 29 Type-1 , 126 numerical, 126 functional, 126 Type-k, 126 Type-(k, m),126 Union, 34 Universal quantification, 19 barred, 234 bounded, 49 functional, 233 unbounded, 190 Upper bound, 6 Variable, 126 bound , 128 formal, 126 free, 128 renamed, 145 renaming, 145 Variant, 146 Weakly normal, 213
This Page Intentionally Left Blank
List of Symbols fx 2 Y fx 1 fx t UDA UDAX UEV
u?4v fx
N
gx
f=s fx
N
u
N MAP(A, B ) MAP CP
fcMAPg
x
c A
Y
CO 2 Cp
Y
c P(A) Z MAP(N, N) LUBP(M) GLBP(M) MON(A, B ) P(A) FUN(A, B )
CFUN
1,4 1 1 1 2 2 2 2 2 3 3, 29 4 4 5 5 5 6 6 6 6 6 7 8 8 11 12 16 16 275
19, 30 19 19, 31 19 19 20 20 20 20 21 21 21 22 22 23 23 23, 34 24, 34 24 24 24 24 24 26, 35 26, 35 26, 35 26, 35 27
L. E. Sanchis
276
...
29 30 30 30 31 31 31 31 31 31 32 32 33 33 36 36 36 37 37 37 37 38 38 48 51 53 53 53 53 53 55 55 55 56 56
57 57 58 58 58 59 59 59 59 59 59 59 59 63 68 68 68 81 81 81 81, 89 81, 90 87 87 110 110 117 117 126 126
List of Symbols
277
1 4 ! J
130 130 131 134 136 136 136 137 137 141 145 152 153 157, 158, 180 158 158 163 163 165 171 174 174 174 175 175 175 175 176 178 184 191 191 191 192 192
192 192 192 192 192 192 192 192 193 193 193 197 197 206 207 210 210 210 212 213 213 214 214 214 220 234 236 236 237 239 239 24 1 245 246
This Page Intentionally Left Blank