Abstract
We introduce the notion of eventually uniformly weak truth table array computable (e.u.wtt-a.c.) sets. As our main result, we show that a computably enumerable (c.e.) set has this property iff it is weak truth table (
Here, a set A is e.u.wtt-a.c. if there is an effective procedure which, for any given partial
In addition to our main result, we show several properties of the computably enumerable e.u.wtt-a.c. sets. For instance, the class of these sets is closed downwards under
Finally, we prove that there is a strict hierarchy within the class of the bounded low c.e. sets A depending on the order h that bounds the number of mind changes of a computable approximation of
Keywords
Introduction
The first goal of this paper is to seek to understand the computational power of a class of computably enumerable sets, the maximal sets, in terms of what kinds of sets they can compute, at least through the eyes of a strong reducibility. Our answer to this question yields another goal of this paper. We introduce a new hierarchy classifying computably enumerable sets according to their ability to compute functions and sets, measured in terms of their “mind change” moduli. This is in the spirit of the Strong Jump Tracing [24] and Downey–Greenberg Hierarchies [13]. However, our new hierarchy is not aligned to either of these hierarchies. The new hierarchy is generated via a calibration method involving strong reducibilities and restricted forms of the jump, which may well have further applications. Before we turn to our results, we wish to place them in a historical context.
Post’s programme and maximal sets
Early applications of computability theory to demonstrate problems in classical mathematics were algorithmically undecidable all worked essentially in the same way. These proofs directly code the halting problem into the decision question at hand. It seemed that all semidecidable (i.e. computably enumerable, c.e.) problems, such as the Entscheidungsproblem or the word problem for groups, were simply the halting problem in disguise under the equivalence
In the quest to solve this question, Post’s Programme [32] tried to find a “thinness” property of the complement of a c.e. set which would guarantee Turing incompleteness. In [32], Post gave the motivation for this programme. Whilst he could not solve his problem, he observed that it is possible to solve it using the thinness approach for reducibilities stronger than Turing reducibility, such as m- and
We remind the reader that
In fact Downey and Jockusch [17] showed that if A is hypersimple, then there is no set X with
It is worth noting that the concepts introduced by Post [32] have been highly influential. The original solution to Post’s Problem was by Friedberg [21] and Muchnik [28]. These papers famously introduced the priority method in computability theory. The concepts of immunity and hyperimmunity correlate with various domination properties whose ramifications are still being explored today, both in computability theory and in reverse mathematics. As well as being some of the mainstays of computational complexity (in time bounded form) Post’s fine-grained reducibilities have had applications especially in the theory of algorithmic randomness as they allow for transfer of measure.
Since Post was unable to show that any of his c.e. sets with thin complements were necessarily Turing incomplete, he suggested that perhaps there were c.e. sets with even thinner complements. He asked if there exists a c.e. maximal set. That is, a c.e. co-infinite set M such that for all c.e. sets W, if
Alas no. We now know that Post’s Programme, in its original form, has a negative solution since there is a Turing complete maximal set (Yates [39]). Moreover, since Soare [34] showed that all maximal sets were automorphic in the automorphism group of the lattice of c.e. sets, there are no “extra” properties we could add to maximality which would guarantee Turing incompleteness. Indeed, Cholak, Downey and Stob [8] showed that no property of the lattice of supersets of a c.e. set A alone can guarantee incompleteness.
Ultimately Post’s intuition that structural properties of a c.e. set in the lattice of c.e. sets can guarantee incompleteness does have a realization. Harrington and Soare [25] showed that there is an elementarily definable property Q of c.e. sets such that
Turning the Post programme on its head, Martin [11] and Tennenbaum [36] showed that maximal sets are computationally powerful, rather than weak, as measured by Turing degree. In particular, they are all high. That is, if M is maximal then
The high c.e. degrees are an important well-understood class. Martin realized that the high c.e. degrees capture the computational complexity of a number of classes of c.e. sets. He showed that the high c.e. degrees are precisely the degrees capturing the combinatorics and computational power (in terms of
It is not important here to define these sets, save to say that they are important classes of c.e. sets.
That is, if f is computable then
Beginning with the work of Downey, Jockusch and Stob [15,16], a finer classification of c.e. sets has been initiated. This classifies sets according to the number of mind changes needed to compute approximations. Shoenfield’s Limit Lemma says that
The [15] intuition is that we can classify c.e. degrees and sets according to the mind-change complexity of the functions computable from them. A degree would be computationally weak in this sense if it could only compute things with computable approximations which have few mind changes. Downey, Jockusch and Stob studied the c.e. degrees
Again the notion of being totally ω-c.a. captures the combinatorics of a large number of constructions in computability theory, algorithmic randomness and effective model theory. We refer the reader to [13] for a detailed discussion.
Related here, and of great relevance to us, comes the notion of approximating partial
Jump tracing is widely used in the theory of algorithmic randomness, and is a lowness property, in that it implies computational weakness. For example, a natural refinement of the notion of a low set is called superlowness. A set A is superlow if
Our work was inspired by the following attractive result which characterizes the Turing degrees of the c.e. sets which are not wtt-reducible to hypersimple sets.
(Barmpalias, Downey and Greenberg [5]).
A c.e. Turing degree
Our motivating question, asked by Ambos-Spies, is “What is the analog of Theorem 1.2 if we replace hypersimple by maximal?”.
Our hope was that we would get a class of sets A which fell into one of the classes totally ω-c.a., array computable, superlow, or similar classes already investigated in the literature. Unfortunately, this is not the case. It turned out that the answer to Ambos-Spies’s question lay not in understanding the Turing jump, but a weaker notion called the
The way that this classification came about was quite natural. Initially, we found that if A was a c.e. superlow set,
The
-jump
The strong reducibilities, in particular
The earliest analog of a jump operator using only bounded reducibilities is the “mini-jump” hierarchy introduced by Ershov [18] as discussed in Odifreddi [31], Chapter XI.6. Ershov’s hierarchy concerned a jump operator for the m-degrees involving the partial m-degrees. Also a bounded analog of the jump for
For us the bounded jump for
The analog of the idea of lowness for the bounded jump can be defined as follows. A set A is bounded low or
We discovered that, if A is
The main theorem
In the end, we discovered that a technical variation of the idea above actually gives a necessary and sufficient condition. This variation will be defined in Section 4, and is called eventually uniformly
For a c.e. A,
Moreover, in this theorem we may replace maximal sets by quasimaximal sets or hyperhypersimple sets or dense simple sets. The proof of Theorem 1.3 is quite technical and will be given in Section 4.
We have seen that our new notion of (eventual)
Since the new notions concern weak truth table reducibility, it is natural to explore these concepts via reducibilities stronger
A new hierarchy of bounded lowness
In Section 6, we have a closer look at the
There is a T-complete
In fact, we get more. The
We first show that this hierarchy is proper. This result allows us to can define very strong lowness notions, such as A being strongly
We follow the standard notation as given in [35]. In particular,
Basic definitions and properties
Let us start by giving the definition of the bounded jump. The underlying notation is mostly adapted from [13].
([13]).
For any set
For notational convenience, we define the bounded jump
Using
We fix computable approximations
Moreover, we will often make use of the Recursion Theorem (with Parameters) with respect to
A sequence of
Then the following lemma says that
Let
There exists
There exists a computable function
For the “only if”-part of clause 1., note that a sequence
For the proofs of clauses 2. and 3., it is easy to see that the proofs of the Recursion Theorem and the Recursion Theorem with Parameters can be carried out in the setting of uniformly computable
For clause 2., the proof is as follows. For any numbers
For clause 3., we argue analogously. Let
It is natural to ask what properties the bounded jump operator share with the classical Turing jump operator if we replace Turing reductions by
Let A and B be any (not necessarily c.e.) sets. Then the following holds.
If
There exists a strictly increasing computable function
However, not every property of the Turing jump carries over to the bounded jump as the following lemma of [13] shows.
([13], Lemma 3.6).
There is a c.e. set B and a set A such that
The fact that the converse of clause 5. in Lemma 3.4 fails is due to the fact that the Complement Lemma does not carry over to bounded-c.e. sets as Downey and Greenberg also show in [13, Proposition 3.1(3)]. However, the proof of Lemma 3.5 (and similarly for [13, Proposition 3.1(3)]) builds on the fact that the set A constructed there may change its mind whether a given x is in A or not more than once. This leaves the question open whether the Complement Lemma and hence the converse of clause 5. in Lemma 3.4 hold if A is chosen to be computably enumerable. We can affirmatively answer both questions.
For any sets A and B such that A is c.e. or co-c.e., if A and
For a proof of the first part of the lemma, fix sets A and B such that A is c.e. or co-c.e. and A and
Let
For the second part of Lemma 3.6, it suffices to note that
Next, we formulate and prove the main result of this paper.
For our main result, we make the following definition.
A set A is eventually uniformly
Now the main result is as follows.
For a c.e. set A the following are equivalent.
A is eventually uniformly
A is
A is ibT-reducible to some maximal (quasi-maximal, hh-simple, dense simple) set.
Since
Let A be c.e. and eventually uniformly
Let A and D be c.e. sets such that
In the remainder of this section we prove these two theorems.
Let
Before we give the formal construction, let us discuss some of the ideas behind it and introduce some of the concepts to be used in the construction. We start with the task of making M maximal.
In order to make M maximal, it suffices to ensure that the complement of M is infinite,
In order to achieve these goals, just as in the classical maximal set construction (as for instance in Soare [35]), we use n-states and “optimize” the states of almost all elements in
For this sake we use the full binary tree
In order to approximate the true path, for any node α and any stage s, we let
Next we explore under which assumptions on M the true path TP actually has the desired properties, i.e., satisfies that, for any n,
We can now state the two crucial facts on TP used in the proof.
Assume (
10
). For any node
For a proof of the first part, fix For a proof of the second part, fix
Assume that M is c.e. and coinfinite. If, for any
Since
The Infinity Lemma shows that (assuming
Having introduced the basic technical notions needed for the maximal set strategy, we now turn to the second goal of the construction, namely, to ensure that the given computably enumerable e.u.wtt-a.c. set A is ibT-reducible to the maximal set M that we construct. We first note that this part requires the construction of a uniformly computable sequence of auxiliary
Now, coming back to the second goal of the construction, in order to ensure that A is ibT-reducible to M, we use a variant of straight permitting: if a number x enters A at a “late” stage s then, in order to indicate that x is in A we enumerate a number
The above explains how, for a single α on or to the right of the true path, we can ensure that
For the actual construction, however, we have to ensure that, for any α on the true path, almost all numbers left in
There is one technical problem left, however. We cannot achieve that, for
Having explained the ideas of the construction and some of its technical features, we now turn to the construction. Any stage
In Step 1 the blocks are defined. We let the nodes β with
In Steps 2 and 3, the partial use functions
In Step 4 blocks become frozen. We say that a block
In Step 5 numbers are enumerated into M, i.e.,
Now, using the notation introduced above, the steps of stage Step 1 (Defining the blocks
Neither β nor any equivalent node For any node For any node β is eligible at stage s, and there is a block B which is suitable for the definition of The block B has cardinality If (a) holds then declare that β becomes eligible, set If (b) holds then let If no node requires attention then Step 1 of stage Step 2 (Defining the partial computable use functions Step 3 (Defining the Step 4 (Freezing blocks). A block For any x covered by Step 5 (Enumerating M). A number (Freezing) There is a block (Enumerating nonblock numbers) y is not in any block defined at stage (Coding A into M) There is a node α and a number n such that the block
Fix β minimal such that β requires attention.
If there is a freezable block then choose
This completes the construction. In the remainder of the proof we show that M has the required properties.
We first summarize the properties of the blocks we will need.
The definition of the blocks satisfies the following conditions.
If
If
If
If
If
If
Assume that
There is an infinite path p through
With the exception of property (B7) the proof only depends on the definition of the blocks and not on the other parts of the construction. In case of (B7) we use that at any stage We tacitly use that the restraint function is nondecreasing in both arguments, i.e., (B0). This is immediate by clause (ii) in the definition of suitability since, for any node α and any stage s, (B1). This is immediate by clause (ii) in the definition of suitability since, for any node α and any stage s,
(B2). If β is the priority of the block (B3). Assume that (B4). Assume that Hence, for the remainder of the proof of (B4), fix Now, the proof of (31)–(33) is in two steps: before we prove (31), we show that (31) implies (32) and (33). So assume (31). Now, if It remains to establish (31). By assumption This leaves the case that (B5). Fix α, (B6). The proof is indirect. Assume that We claim that there is a stage Having established the existence of So, for the remainder of the argument we may fix the So in order to show that This completes the proof of (B6). (B7). First note that infinitely many blocks become defined. (Namely, otherwise, it follows that M is finite since any number y which is enumerated into M at stage Now, by König’s Lemma, let p be the leftmost infinite path through B. To show that p has the required properties, first fix α on p and This completes the proof of (B7) and the proof of Claim 3. □
Next we summarize relevant properties of the use functions
The partial functions
Uniform computability follows by the effectivity of (part 1 of) the construction. The second part of the claim is immediate by definition and by (B3). The third part is immediate by definition. □
The functionals
The proof of the first part is straightforward. For a proof of the second part, for a contradiction assume
Note that the first part of Claim 5 justifies that in advance we have fixed a computable function f satisfying (21).
Assume that
There is a number
Part (i) is immediate by the second part of Claim 5. Part (ii) follows from part (i) by (23) and (25). □
For the remaining claims we need some more notation. Let p be the unique path through T defined in (B7). Then, for any node α such that
Let
Note that, by (B2), there are only finitely many blocks which may cover x. So there is a stage For a proof of (a) recall that x will be truly α-covered eventually. So there is a stage s and a number n such that the block For a proof of (b), it suffices to consider the case of
Assume that
We prove the first part of the claim. The second part is obtained by straightforward modifications of the proof. We first show that a number Now, by the above and by construction, a number Since between any two stages
It suffices to give an effective procedure which computes Let Note that such a stage s exists. (Namely, by Claim 7, there is a block We claim that
By (B2) and by Claim 7 there are infinitely many blocks which are never frozen. So the claim follows by Claim 8. □
For any node
Fix
The true path
Claim 10 and (B6) immediately imply that
For any α on
Fix This completes the proof of Claim 13. □
M is maximal.
By the effectivity of the construction and by Claims 10 and 13, the hypotheses of the Maximal Set Lemma (Claim 2) are satisfied. □
By Claims 9 and 14, M has the required properties. This completes the proof the Theorem 4.3. □
In order to complete the proof of the Characterization Theorem it remains to prove Theorem 4.4. For this sake, we use the following characterization of the dense simple sets given in Robinson [33]: a c.e. set D is dense simple if and only if D is coinfinite and, for every strong array Fix c.e. sets A and D such that Fix a Now the computable functions Obviously, the functions g, h and k are computable, and h is an order. Moreover, g is the canonical approximation of For a proof of (7) it suffices to note that k is 0-1-valued and that the three clauses in equation (41) that characterize the stages s such that For a proof of (8) fix So fix t as in (42). Then Finally, for a proof of (9), fix e such that This completes the proof of Theorem 4.4. □
In this section, we prove that EUwttAC is closed downwards under
Let A and B be any (not necessarily c.e.) sets such that
Fix computable functions g, k and h such that B is e.u.wtt-a.c. via g, k and h, and, by clause 1. of Lemma 3.4, fix a computable function f such that
For the closure under the join operation (and for some later applications), we need the following technical lemma.
Let
Given computable enumerations
Note that
By applying Lemma 5.2, now we can prove that EUwttAC is closed under join.
Let
Fix computable functions
The above closure properties of EUwttAC show that the
The class
The first part of the theorem is immediate by Lemmas 5.1 and 5.3. For the second part of the theorem, note that, by Theorem 4.2, any maximal set is e.u.wtt-a.c. So the claim follows by Martin’s Theorem [11] which asserts that any high c.e. Turing degree contains a maximal set. □
In the remainder of the paper we relate the eventually uniformly
In this section, we will study notions of lowness for the bounded jump, i.e., we will look at the
-Superlow sets are eventually uniformly
-array computable
We recall the following definition from the introduction.
A (not necessarily c.e.) set A is
In order to show that any (not necessarily c.e.)
Let A be any (not necessarily c.e.) set. The following are equivalent.
A is
There exists a computable order h such that any set B which is bounded-c.e. in A is h-c.a.
The equivalence of the first three clauses 1., 2. and 3. is immediate by the general fact that, for any set B,
So suppose that
Any (not necessarily c.e.)
Assume that A is
From Lemma 6.2 we can further deduce that the class of the
Let A and B be any (not necessarily c.e.) sets such that
Let
(a). By (b). By Lemma 5.2 fix computable functions
For computably enumerable sets the equivalent characterizations of
A set A is h-
For a c.e. set A, A is
By Lemma 6.2, Theorem 6.6 is immediate by the following two lemmas. In these lemmas, in addition we analyze how the relevant orders are affected if we go from one notion to the other. (This analysis will be used below in the proof of Lemma 6.12).
Let A be a c.e. set, let h be a computable order, and suppose that
We adapt some of the techniques from [29, Theorem 4.1] where it is shown that the c.e. superlow sets coincide with the c.e. jump traceable sets. Fix a computable function Now, along with Stage 0. Let Stage If If By the effectivity of the construction, It remains to show that
Let A be a c.e. set. There exists a strictly increasing computable function
Given a computable enumeration Now fix a computable order h and suppose that A is h- In order to show that the number of mind changes of
If neither of the previous cases applies then let
We conclude the section by looking at strong variants of
The key to the hierarchy results in this subsection is the following technical lemma.
Let h,
By a finite injury argument, we give a computable enumeration We make In order to guarantee that Since, for any order h, any h-c.a. set B is h-c.a. via a primitive recursive function, condition (52) can be broken up into the (positive) requirements
The basic strategy for meeting requirement Now, in order to make the We say that Note that Here we achieve this by letting It remains to show that the negative requirements So, if we let Having outlined the construction, we conclude the proof by giving the formal construction. We start with some additional notation. Let Stage 0 is vacuous, i.e., Stage either If Distinguish the following subcases. If (b1) holds then let This completes the construction. The correctness of the construction follows from the preceding discussion. A formal verification is left to the reader. □
Let
There is a c.e. set A such that
There is a c.e. set A such that
(a). Let h, (b). Note that, for any computable orders Let neg be a strictly increasing computable function such that It remains to show that (49) and (50) hold. The former is immediate by the definition of
For any requirement
We now show that there is a noncomputable c.e. set – in fact, a Turing complete set – A such that
A set A is strongly
We first observe that the equivalence of
Let A be a c.e. set. A is strongly
First assume that A is strongly
Now assume that A is strongly
There exists a Turing complete set A which is strongly
We give a computable enumeration
Note that, for any stage s,
By Lemma 6.12, it suffices to make A strongly
Assume that
Fix
Now, by the above discussion, it suffices to choose the numbers
The strategy for meeting (60) (if necessary) is as follows. Given e and n such that Given s, fix e, n, t such that
Unfortunately, however, this definition does not satisfy (58). Still, for fixed e, such that Given s, fix e, n, t such that there is a number
then let
We complete the proof by arguing more formally that condition (57), condition (58), and, for orders
For a proof of (58) fix x. Let u be minimal such that
Finally, fix e such that
This completes the proof of Theorem 6.13. □
We conclude this section by showing that the class of the strongly
Let A and B be any (not necessarily c.e.) sets such that
Let
(a). Given a computable order h, it suffices to show that (b) Given a computable order h, it suffices to show that
In the preceding section we have shown that the class of the c.e.
Before we do so, we give some background on the array (non)computable sets and degrees. We mentioned in the introduction, already, that the array computable degrees, introduced by Downey, Jockusch and Stob [15], have proven a highly successful unifying tool in the study of the computational power of c.e. (and general) sets and Turing degrees. We recall from [15] that a degree
The c.e. a.n.c. degrees are those that:
(Barmpalias, Downey and McInerney [ 6 ]) have integer valued randoms.
(Downey and Greenberg [ 12 ]) have reals of effective packing dimension 1.
Moreover, (Cholak et al. [
7
]) the array noncomputable c.e. degrees form an invariant class for the lattice of
Having illustrated the importance of the array noncomputable sets and degrees, we now come back to our goal. For this purpose, we have to consider array noncomputable sets and their
Let
By [1, Lemma 1], the property of being multiply permitting for a c.e. set does not depend on the choice of the very strong array.
([1]).
Let A be multiply permitting and let
Moreover, as shown in [1], too, the multiple-permitting property is
([1]).
For a c.e.
Every c.e. set
Using Lemma 7.3, we can show that the following holds.
Let A be multiply permitting. Then A is not e.u.wtt-a.c.
Suppose that A is multiply permitting. It suffices to show that, for any given computable functions Then we define a Then the definition of Γ is as follows, where we stick to the convention that
Stage 0. Let Stage If If By definition, Γ is a Turing functional and since, by clause (2), the use of Γ on input n is bounded by Now consider the partial computable function
Let A be c.e. and e.u.wtt-a.c. Then any c.e. set B which is
In the preceding sections we have given lower and upper bounds for the class of the c.e. e.u.wtt-a.c. sets in terms of
We start with the separation of
A c.e. e.u.wtt-a.c. set which is not
-superlow
In order to separate the c.e.
There is a maximal set M which is not
In the proof of the theorem we use the following sufficient condition for a c.e. set M to be not Assume that M is c.e. and there is a partial computable function ψ and a Turing functional Ψ such that the following hold.
By (63) there is an index e such that the domain of We construct a c.e. set M, an auxiliary partial computable function ψ, and an auxiliary Turing functional Ψ such that M is maximal and (63) and (64) hold. Then, by Lemma 8.2, the set M has the required properties. The construction is in stages, and we let The proof is similar to the proof of Theorem 4.3 though less involved. In particular, in order to make M maximal, we use the maximal set technique based on a priority tree introduced there. We use the notation introduced there as well as the basic observations made there, hence assume the reader to be familiar with the first part of the proof of Theorem 4.3 discussing the maximal set strategy (up to the Maximal Set Lemma). The strategy to make M not The basic strategy for meeting requirement Note that this procedure ensures that the approximation In order to make this strategy compatible with the maximal set strategy, for any node α of length e there will be a strategy Having explained the underlying ideas we can now give the formal construction of M and the auxiliary functional Ψ and function ψ. If a strategy Stage No target is assigned to Target x is assigned to Assign Appoint the least If (A) holds then let If no strategy This completes the construction. In the remainder of the proof we show that the set M has the required properties. This proof uses that the Infinity Lemma and the Maximal Set Lemma hold which were established in the proof of Theorem 4.3 already. Now, first note that the construction is effective and So it only remains to show that
For any number y and any stage s there is at most one node α such that y is an
By a straightforward induction on s. For the proof of the final part note that if
Assume that y is the least follower of
For a contradiction assume that
Any strategy
Note that the strategies
Assume that
If
Requirement
(i). Assume that (ii). For a contradiction assume that requirement (iii). Obviously, there are infinitely many numbers
There are infinitely many stages s at which some strategy becomes active via clause (b).
For a contradiction fix a stage
By Claim 2 it suffices to show that there are infinitely many strategies
M is maximal and not
As observed before, M is c.e. and (63) holds. So, in order to show that M is maximal, by the Maximal Set Lemma it suffices to show that This completes the proof of Theorem 8.1. □
There is an e.u.wtt-a.c. c.e. set which is not
Fix the least α (if any) such that
In case of (b) or (c), initialize all lower priority strategies
In this subsection we show that there is an array computable Turing degree which contains a c.e. set which is not e.u.wtt-a.c. By the Characterization Theorem 4.2 it suffices to prove the following theorem.
There is a c.e. set A such that the Turing degree of A is array computable and such that A is not
Before proving the theorem, let us first describe the basic strategy for building a c.e. set which is not
A c.e. set A such that A is not
The strategy for meeting
Now we are ready to prove Theorem 8.4. By a tree argument, we construct a c.e. set A with the required properties. The finite part of A enumerated by the end of stage s is denoted by In order to ensure that A is not We call a requirement infinitary if its hypothesis is true. We need guesses which Define the computable length function l by
The true path For each node α of length e there is a strategy At stage s any strategy If a strategy If a strategy is initialized then it has to start all over again. In addition to initialization there will be freezing and partial cancellation. This affects only some of the intervals and the work on the current interval to be defined, respectively. If an interval is frozen then it cannot be used for diagonalization later (hence its followers cannot be enumerated into A later). Similarly all of the followers of an interval under construction may be cancelled. In this case the construction of this interval has to be started all over again with new followers greater than the current stage. There are two events which may lead to freezing of an α-interval If a strategy At the end of any stage s, initialize all strategies Then stage Requiring attention and the corresponding potential action. Corresponding action. For the least such n, declare that Initialize all strategies There is an n such that Corresponding action. Put the greatest follower Initialize all strategies (i) does not hold, there is an n such that Corresponding action. For the least k such that Initialize all strategies (i) does not hold, there is an n such that Corresponding action. Let Initialize all strategies Selecting the strategy which will act. If there is a strategy which requires attention then, for any VERIFICATION.
Assume that
By assumption and by construction, strategy
Assume that
For a contradiction assume that the claim fails. Fix r minimal such that, for some number e,
By (76), (77) and (78), any strategy Next observe that, by the second part of (75) and by the definition of the rank, there are at most m permanent For this sake we first observe that there is a stage s such that
The existence of such a stage is shown as follows. Since there are infinitely many Now fix a stage s as in (79). It suffices to show that If
The proof is by induction on e. Fix e. Since
Assume that
By Claim 3 let So, as pointed out in the description of the basic strategy for building a c.e. set which is not For a proof of (83), for a contradiction, assume that there are only finitely many permanent It remains to show (84). For a contradiction assume that
W.l.o.g. we may assume that Now, by Claims 1, 2 and 3, fix an Note that Now, in order to get the desired contradiction, we distinguish the following two cases depending of the state of
W.l.o.g. assume that Now, by (90), for a proof of (89) it suffices to show that, for any By Claims 5 and 6 all requirements are met. This completes the proof of the theorem. □
There is an array computable c.e. Turing degree
Having introduced some new classification tools including a hierarchy of bounded lowness notions, we have an infinite number of questions we might ask. We mention a couple.
One separation we have not yet succeeded in finding is a Turing degree containing an e.u.wtt-a.c. c.e. set which does not contain a
Some of the notions considered in this paper – like
A set A is eventually uniformly array computable if there exist computable functions
This notion and similar ones seem to yield classes of degrees of complexity different than any seen before. They appear worth investigating.
Footnotes
Acknowledgements
Downey is partially supported by Marsden Fund of New Zealand. The results of this paper were obtained whilst Downey was an Alexander von Humboldt Fellow at the University of Heidelberg.
