Abstract
In (A Hierarchy of Turing Degrees: A Transfinite Hierarchy of Lowness Notions in the Computably Enumerable Degrees, Unifying Classes, and Natural Definability (2020), Annals of Mathematics Studies, Princeton University Press), Downey and Greenberg define a transfinite hierarchy of
Keywords
Introduction
One underlying theme in mathematical logic is calibrating mathematical objects in various hierarchies. In computability theory this method also seems to give alignment between syntactical and algorithmic complexity of the objects in question. For instance, the arithmetical hierarchy aligns itself with iterations of the Turing Jump.
In this spirit, building on earlier work of Downey, Greenberg and Weber [4], Downey and Greenberg [3,5] introduced a new transfinite hierarchy of (mainly computably enumerable) degrees based around considerations about the “mind-change” functions of computable approximations of
Unifies the combinatorics of a wide class of constructions, both in the Turing degrees and in areas of applications of computability theory, such as effective model theory and algorithmic randomness.
Gives a number of new examples of natural definability of degree classes in the c.e. degrees.
Gives such results within the
Of course, this “mind change” hierarchy was built on the ideas of many early studies. These studies began with Ershov [8–10], and Epstein, Haass, and Kramer [7], which extended the idea of a d.c.e. set, which is one with a computable approximation where elements begin outside, can enter, and then might leave. Indeed, the Limit Lemma says that each set
In [5], a number of apparently difficult and natural questions were left open about the structure of the hierarchy. Several of these questions involved notions of maximality in this hierarchy. In this paper we solve a number of these questions, and hence this paper complements the monograph [5] in an essential way. The overarching goal of the present paper is to understand the extent to which the hierarchy collapses, and to identify unusual or interesting features.
Background: Array computable, and totally ω-c.a. degrees
The Shoenfield Limit Lemma [15] states that a function
A c.e. Turing degree
Weakening array computability, a c.e. degree is totally ω-computably approximable if every function
Totally α-c.a. degrees
Considerations of embeddings of the 1-3-1 lattice, closely related to critical triples, led Downey and Greenberg to define a further weakening of the notion of totally ω-c.a. degrees, and by generalisation, to a transfinite hierarchy of such lowness-like notions. The generalisation utilises the Ershov hierarchy. Much like complexity related to the mind-change function, Ershov calibrates the complexity of a computable approximation, and by extension, of the function being approximated, by considering well-founded witnesses to the approximation settling down. Namely, for a computable ordinal α, an α-computable approximation is a computable approximation
An important caveat is that care has to be taken in the choice of the computable presentation of an ordinal α; such a presentation of course is required to make sense of computability of functions with range α. In general, many presentations are very much nonequivalent, in that they yield different classes of functions and degrees. Indeed, every
Hierarchy collapse
One of the first questions to ask is whether the hierarchy is proper. At what levels is there collapse, in that no new degrees inhabit the level? This question was settled in [5]. For
([5]).
Let
Thus, the first proper levels of the hierarchy are the totally ω-c.a., totally
Next, it is natural to check what happens to the hierarchy in upper and lower cones. In this paper we show that the hierarchy does not collapse in lower cones. Henceforth, all degrees are c.e.
Let
We remark that the degree produced for Theorem 1.2 is proper in a strong way: it is not uniformly totally α-c.a. See Section 6.
We do not know whether no collapse occurs in upper cones. We prove the following two results:
Let
In particular, above every totally ω-c.a. degree there are properly
Let
That is, above every totally
Is every totally ω-c.a. degree bounded by a properly totally
If the degree we start with is superlow, then the answer is positive; see Section 4.
In [5] it is shown that for every
In [5] the following is proved:
([5]).
Let
As a corollary we see:
If
Every maximal totally α-c.a. degree is properly totally α-c.a.
Thus maximality is closely related to hierarchy collapse. Indeed, to prove Theorem 1.3, we show:
Let
On the other hand we show
Let
Toward proving Theorem 1.8 we examine ‘maximal covers’, see Theorem 5.1.
Similarly to Question 1.5, we ask:
Is every totally ω-c.a. degree bounded by a maximal totally
A positive solution will necessarily be non-uniform. Again, we get a positive answer for superlow degrees.
Solving these problems required several new techniques. For instance, the proof of Theorem 1.7 is the first example of a construction of degrees in one of these bounded classes where there is infinitary positive activity along the true path of the strategy tree. We believe that our techniques will have wider applications.
Throughout, we mostly follow the notation from [5]. In particular, we use lower-case Greek letters to denote the use of the corresponding upper-case functionals. We interpret the use differently, depending on the situation:
If a functional Φ is given to us, or the oracle X is given to us, then for any input x, the use
When a functional Λ that we build applies to a set D that we are enumerating, then the use is the only number queried. So if we define a computation
Sometimes, functionals that we build will take more than one oracle; some we build, some we don’t. We will usually apply the second convention, but this will be specified.
For diagonalising against α-c.a. functions, we use enumerations of approximations. We use the terminology from [5, Section 2.1.2]. An
For every
([5]).
Non-collapsing in upper cones
In this section we prove Theorem 1.4. We prove a slightly more general theorem, which we believe will make the ordinal combinatorics clearer.
Let
For Theorem 1.4 let
To prove the theorem, fix a c.e. set A (with an effective enumeration
Let
To make
Note that we could have added A as an oracle to Λ. However, we will see that this is not useful.
The proof uses some ideas from the proofs of Theorems 3.6 and 4.12 from [5].
We build a tree of strategies. A node σ working for a requirement
A node τ working for
Such computations will be destroyed either by an A-change or a D-change. We soon discuss how to get an ordinal bound, below
However, sometimes D-changes destroy
D-changes are caused by nodes σ for positive requirements
The ordinal arithmetic here follows ideas that were used in [5]. Let
When a node τ as above certifies a computation
There will be counting difficulties, but first we need to argue that this process will end: that if σ lies on the true path, that eventually it will get a follower which is never cancelled. First, to this end, we see that even though we appoint a new large follower
Now for the counting difficulties. Suppose that
We now turn to the formal details of the construction.
A node τ working for requirement
The nodes
Since A is
A node σ working for requirement
Construction
Let s be a stage. During the stage we define
Suppose that τ, working for
Suppose that
Recall that t is the previous stage at which
For each
Suppose now that
Let σ working for
s is the first stage, after the last stage at which σ was initialised, at which σ is accessible. For all
σ has a follower p, but for some
σ has a follower p, case (ii) fails, and
σ has a follower p, case (ii) fails, and
Note that we eventually run into a new long node σ, so each stage has only finitely many steps. At the conclusion of stage s, we maintain the functional Λ to ensure its totality: for any
Verification
We introduce terminology: for a node μ on the tree, we denote s to be a μ-stage if
Let σ be a node working for requirement
Let
For any node σ, if p is a follower for σ at the beginning of stage s, then
Formally, by induction on s. When σ appoints p, or enumerates
Let σ be a node working for some
Let
We need to be sure that if a computation is destroyed by a change in D, its tracker is cancelled immediately to allow us to correctly anticipate further A-changes.
Let τ be a node working for requirement
If
Suppose that (i) and (ii) hold up to stage s, and that the lemma’s hypotheses hold at s. Let
For (ii), suppose that
Since
Now we ask: how does τ relate to σ?
If σ lies to the right of
Suppose that
Hence
Let τ be a node working for requirement
Let the true path, μ is initialised only finitely often.
If μ lies to the right of some node in
Let σ be a node which works for
Let
Let σ be a node working for requirement
Note that
Suppose not; let
The following lemma fits here but will only be used later.
Let σ be a node working for requirement
σ’s follower p is cancelled at stage t because
We need to argue that
Let
Let s be the second σ-stage after the last stage at which σ is initialised. By stage s we have already defined
Let
Let
By Corollary 2.6,
The following will imply that
Suppose that τ works for
Every
If
If
Let
After the last stage at which τ is initialised, such a tracker can be cancelled only by nodes σ such that
For (2), suppose that
Suppose then that c is chosen as a tracker for some x and is never cancelled. At every sufficiently late
Therefore, there is some
Now we suppose that
The true path
The empty node lies on the true path. We show that every node on the true path has a child on the true path.
This is clear for a node τ working for some
Suppose that
Let σ be a node which works for
The true path then contains, for every P and Q requirement, a node that works for it. But first we need to show:
Let
Suppose then that p is appointed as a follower for a node σ working for
Every requirement
Fix
To show that the Q-requirements are met, for simplicity, we use the commutative addition operation on ordinals. For ordinals γ, δ, the commutative ordinal sum
The following are well known:
⊕ is commutative and associative. Any power of ω is closed under ⊕. Let
Every requirement
Let From now on, fix To define the ordinal bound we need to measure both A-changes and D-changes. For the A-changes, we note that for all
For all
The first part is immediate: For the D-changes, let For
For all
Let Fix some
For all
Because α is closed under addition, we could have defined Let
For
For all
The last fact we need is the following.
Let
Recall that Suppose that If σ lies to the right of ρ, then σ is initialised at stage Now suppose that
We are now ready to define our ordinal bound. For each
We need to show that for all
Let
Suppose that
This concludes the proof of Lemma 2.15, and so of Theorem 2.1. □
We could modify the previous construction: instead of diagonalising against all β-c.a. functions we can diagonalise against all functions which are γ-c.a. for some
Existence of maximal degrees in upper cones
In this section we prove Theorem 1.7. Indeed we prove the slightly more general theorem:
Let
Theorem 1.7 follows since if
Let
Let
For the maximality property of
Discussion
As usual, we work with a tree of strategies. Nodes τ working for
Let us discuss this in greater detail. Suppose that σ appoints a follower p with the aim of making
It seems though that we nonetheless run into the same problem as in the previous construction: after we lift the use we get an A-change below
Now unlike the previous construction, we do not want the α-ordinal count tracked by some
Strategy tree
A node τ working for requirement
A node σ working for requirement
The node σ is responsible for the enumeration of an enumeration operator
During the construction, the node σ will likely appoint several followers. Each follower p is connected with a particular potential element k of
A follower p for σ may become realised at some σ-stage. This will be a σ-stage at which we see
A follower
To this end, we let
Again, the idea is that for
The functionals
Construction
Let s be a stage. First, at s, we observe the effects of enumerations into If p is currently unrealised, we cancel it. If p is realised, then we redefine
If such action occurred, we end the stage.
If the stage was not terminated, we proceed to define the collection
Let
Let
σ has a permitted follower. There may be more than one permitted follower. For each permitted follower If If
Now we decide which, if any, child of σ is next accessible:
If
Otherwise, if all permitted followers were just cancelled, then we let
Otherwise, we let
σ has no permitted followers, but does have a yet unrealised follower
If
If
Suppose that σ has no followers, or that all followers for σ are already realised, but none are permitted.
We maintain
We then let k be the least element of
Note that we eventually run into a long node σ with no followers, so each stage has only finitely many steps.
At the end of every stage, we maintain the functionals
Verification
Before we begin our verification, we need to show that the construction can run smoothly, in that its instructions can be carried out.
Let σ be a node working for requirement
If
If p is a follower for σ at a σ-stage s, and p is realised by the end of the stage, then for all
Between stages at which σ is initialised, for all k, σ appoints at most one follower
For (1), let
For (2), Let
For (3), suppose that at stage t, a follower
For any node σ working for
A computation is defined with
Our next task is to show that protection works: action for a follower p cannot injure a computation
Let p be a follower for a node σ working for requirement
The stage s is a σ-stage. The follower
As σ was not initialised between stages r and s, by stage r, p was already chosen as a follower and realised. At stage r we define
As in the previous proof, we need to be sure that if a computation is destroyed by a change in D, its tracker is cancelled immediately, to allow us to correctly anticipate further A-changes. Note that the following lemma implies that though we may have infinite positive action by a node on the true path, this action will not injure weaker nodes on the true path: they simply wait for the action and confirm only relatively small numbers.
Let τ be a node working for requirement
If
Suppose that (i) and (ii) hold up to stage s, and that the lemma’s hypotheses hold at s. The proof of part (i) is identical to the corresponding part of Lemma 2.5. Again let
For (ii), suppose that
Since
As before we ask: how does τ relate to σ?
If σ lies to the right of
There are two possibilities left:
Suppose that
Hence
Suppose that
We obtain the analogue of Corollary 2.6:
Let τ be a node working for requirement
We also obtain the analogue of Lemma 2.7, with the same proof:
Let σ be a node which works for
Let the true path, μ is initialised only finitely often.
Note that unlike the previous construction, in this construction nodes sometimes get initialised even if they don’t lie to the right of
Suppose that τ works for
Every
If
If
The proof is almost identical to the proof of Lemma 2.11. For (1), we need to observe that for all
For (2), we only need to add that if
Let
Let
Let
If
There are a couple of possibilities. If there is a stage
Otherwise,
The true path
First we need to show that the empty node lies on the true path. This amounts to showing that it is impossible that at all but finitely many stages, some realised follower gets permitted or an unrealised follower cancelled. But in that case, there are only finitely many followers ever appointed, and each such follower is realised or cancelled at most once.
We the observe that every node on the true path has a child on the true path. Nodes τ working for
For all e,
Every requirement
There are three possibilities.
First, suppose that some follower p for σ is permitted and never cancelled. The argument of Lemma 2.14 shows that
Second, suppose that some follower p for σ is appointed, never cancelled, and never realised. Then
The last possibility is that every follower is eventually cancelled or realised; but every permitted follower is later cancelled. In this case we show that
For one direction, we use:
Suppose that s is a σ-stage and suppose that at stage s, σ has no permitted followers. Then
Let
Now we note that there are infinitely many σ-stages s at which σ has no permitted follower: suppose that t is a σ-stage at which σ has some permitted followers. While σ has some permitted followers, no new followers are appointed. Each permitted follower is eventually cancelled. Hence, even if more followers are permitted (while some permitted followers from stage t are still around), eventually there will be a
In the other direction, we observe that there are infinitely many σ-stages s at which option (iii) is taken:
By induction on
The following will conclude the proof of Theorem 3.1.
For all
The proof is similar to the proof of Lemma 2.15, but simpler, because we do not need to count the (ordinal) number of possible followers for a node σ. Let From now on, fix Again we measure A-changes and D-changes. The A-changes are measured exactly as in the previous construction: for
For all
To measure the D-changes, we let p is realised at stage t; or at stage t, p’s node σ enumerates
For all
The first part follows from the fact that p is realised at or before stage t. The second part is similar to the proof of Claim 2.15.2. Since Finally, we need:
Let
Essentially identical to the proof of Claim 2.15.5. We need to show that if action for a follower p of a node σ destroys the The rest is again the same (but simpler). For each
So for all
Recall that a set A is superlow if
Let
Let A be a superlow c.e. set. We enumerate a set D such that
The requirements are similar to the ones for the previous construction (Section 2). Let
For the maximality property, we enumerate a Turing functional
Discussion
The construction is similar to the previous one (proving Theorem 3.1). The extra strength we have is the ability to approximation not only total A-computable functions but also partial ones. How does this help? Now a node τ, working for
Consider first the simpler case,
In the slightly more complicated case
Strategy tree
A less important yet convenient advantage in the superlow case is the existence of a universal A-partial computable function; this gives us a way to obtain approximations uniformly, so they don’t need to be guessed. A node τ on the tree working for
The node τ enumerates a “shadow” functional
Nodes σ working for
Construction
The construction is identical to the construction proving Theorem 3.1, except that the behaviour of the τ-nodes is a bit simpler. Every stage s starts with an attempt to permit realised followers of nodes σ, or cancel unrealised followers for such nodes, based on enumerations of numbers into
Suppose that a node τ, working for requirement
Suppose that
Next we determine which outcome is accessible. Let r be the previous
Otherwise, let y be the least number such that
The instructions for a node σ working for
At the end of every stage we maintain the functionals
Verification
Most of the verification follows that of the previous construction, except that in places it is simpler. We list the lemmas we need. Lemma 3.2 and its proof is copied verbatim, as are the statements and proofs of Lemmas 3.3 to 3.5 and 3.7 and Corollary 3.6.
Lemma 3.8 is different. Indeed,
Suppose that τ works for D and that
Every
If
If
(1) is proved in the same way as the corresponding part of Lemma 3.8.
(2) is not complicated; for every
The interesting part is (3). Suppose that
Corollary 3.9 and Lemmas 3.10 to 3.13 now follow, with the same proofs. All that remains is:
For all
We start as in the proof of Lemma 3.14. Let τ on the true path work for Our mechanisms for counting A- and D-changes are the same. We define
Let
This means: if Now define We let To prove that this works, we first need to show that if Suppose that
We can generalise superlowness to higher ordinals:
Let
If A is c.e. then A is α-superlow if every A-partial computable function is α-c.a., equivalently, if a universal A-partial computable function (often denoted by
Let
This is a finite injury construction with shifting priorities. We enumerate a c.e. set C and a functional Λ. The requirements to meet are: For For all
Let
A requirement
By induction, we see that every positive requirement
What’s left is calculating an ordinal bound on the “number of times” that a computation
However, trying to generalise the proof of Theorem 4.1 to α-superlow degrees instead of superlow degrees does not work. Here the fundamental difference is the one between the number of times and (an ordinal) “number of times”. If A is α-superlow then the number
Is every
A maximal interval
In this section we prove:
Let
So not only is
We enumerate c.e. sets A and B with the intention that
Some of the requirements are familiar. Let
For the maximality property, for each e, we enumerate a Turing functional
Finally, we add Friedberg–Muchnik requirements:
Discussion
This is a mild elaboration on the construction of a maximal totally α-c.a. degree from [5]. Essentially, we show that that construction is compatible with the introduction of extra Friedberg–Muchnik requirements. Each such requirement acts at most once, and so it is not difficult to take into account how many injuries of this kind a certified computation
Compared to previous constructions, this construction is simplified by not having to work over a given A.
Strategy tree
The tree is simplified as a result. A node τ working for
A node σ working for
Nodes σ working for requirements
Construction
Let s be a stage. Let σ be a node which works for requirement If Otherwise, we redefine
Note that if more than one node σ wishes to act as in (2), then we act for the strongest one only, as the others will be immediately initialised.
If the stage was not terminated, we proceed to define the collection
Let
Let
σ has permitted follower p. If
σ has a yet unrealised follower p. If
σ has no followers, or all followers for σ are already realised, but none are permitted.
We maintain
Suppose that
If ρ has no follower, then we appoint a new, large follower q. We end the stage.
If ρ has a follower q,
Otherwise, we let ρ’s child be next accessible.
At the end of the stage we initialise all nodes weaker than the last accessible node (including all proper extensions of that node). We also maintain the functionals
Verification
The usual lemma that ensures that the construction goes smoothly holds. Lemma 3.2 holds (in (1), of course, replace D by A; in (2), by B); the proofs are simpler. Similarly with Lemmas 3.3, 3.7 and 3.12.
The finitary nature of the construction and the simplicity of the
Let τ be a node working for
Let
Let
(1): The stage r is a (2) is similar, with the complication being that the stage
Let τ be a node on the true path working for
In the non-trivial direction, suppose that
For every
The argument is like that for Lemma 3.13, but simpler, as permitted followers cannot be cancelled. Let σ be the node on the true path which works for First, suppose that some follower p for σ is permitted after stage Otherwise, suppose that some follower p for σ is never cancelled and never realised; then the requirement is met vacuously. Finally, if no follower is permitted, but all followers are realised, then
For all
We use the same terminology. Let Lemma 5.2, together with initialisations at
In this subsection we prove Theorem 1.8: for every α there is some totally α-c.a. which is bounded by no maximal totally α-c.a. degree. Paradoxically, the proof is yet another elaboration on the construction of a maximal degree. We expand the construction of the previous subsection to construct a “maximal (proper) ideal”:
Let
To prove the theorem, we enumerate sets A and
Let
For the maximality property, for each e, we enumerate a Turing functional
And the Friedberg–Muchnik requirements:
Discussion
The construction is a very mild modification of the previous construction. The entire thing proceeds rather pleasantly, and without complication. We just need to explain where n comes from, to meet requirement
Uniformly totally α-c.a. degrees
One of the ideas in [5] was to further refine the totally
Let
([5]).
The following are equivalent for a c.e. degree
For some α-order function h, all functions
For every α-order function h, all functions
A degree
([5]).
Let
For every
There is a degree which is uniformly totally α-c.a. and not totally β-c.a. for any
There is a degree which is totally α-c.a. but not uniformly so.
And again for ordinals which are not powers of ω, we get nothing new: if α is a power of ω and
The last theorem in this paper examines the cone below a c.e. degree which is not totally α-c.a.
Let
This implies Theorem 1.2: indeed, even the refined hierarchy does not collapse at any level in any lower cone.
To prove the theorem, recall that a modulus function g has a “self-modulating” computable approximation for all n and s, if
So
Let
To ensure that
Discussion
We apply the technique of non-total α-c.a. permitting to the construction from [5] that separates between totally α-c.a. and uniformly totally α-c.a. degrees.
To meet
Nodes τ working for
When we change
This has implications to the nature of the reduction of f to g. Originally we would like the use of this reduction to be the identity: say that p is permitted at a stage s if
Strategy tree
A node τ working for
To define the reduction of f to g we will define moveable markers
Construction
Let s be a stage. Let σ be a node which works for requirement
Suppose that the stage did not end. We let
Suppose that a node σ working for requirement
Verification
The sequence
For every p we show that there are finitely many stages s at which
The fact that
Meeting the requirement
Let
Similar to the previous section, except that we have to deal with more than one follower for each node. Let
The familiar process now gives an α-computable approximation to
Let
We claim that there is a follower p for σ which is never cancelled and such that
Suppose then that for every follower p for σ, either p is eventually cancelled, or
Fix
We let
Certainly
For all
By induction on s. At stage
Now suppose that
This is clear if
Overall, we see that
