In this paper, we analyze the problem of finding the minimum dimension n such that an analytic map/ordinary differential equation over can simulate a Turing machine in a way that is robust to perturbations. We show that one-dimensional analytic maps are sufficient to robustly simulate Turing machines; but the minimum dimension for the analytic ordinary differential equations to robustly simulate Turing machines is two, under some reasonable assumptions. We also show that any Turing machine can be simulated by a two-dimensional ordinary differential equation on the compact sphere .
As it is well known (see e.g. [33]), a Turing machine is a mathematical model of computation that formalizes the notion of algorithm/computation over discrete structures such as the set of positive integers or integers . In practice, Turing machines are computationally equivalent to a standard digital computer. Furthermore, following the work of Turing and others it is also known that some problems such as the Halting Problem or Hilbert’s 10th problem are noncomputable, i.e. there is no Turing machine (i.e. no algorithm) that solves those problems [29,34]. These remarkable results show that some problems are algorithmically unsolvable. Examples of other nontrivial behavior regarding Turing machines include, for instance, the existence of universal Turing machines, which can simulate the computation of any other Turing machine (see [34] or e.g. [33]), or the existence of self-reproducing Turing machines which output their own description [31].
Although the results above are considered classically over discrete structures (e.g. ), often they can be studied over continuous spaces such as . The idea is to simulate the computation of a Turing machine with a continuous map/flow. If a continuous system is able to simulate any Turing machine (or, equivalently, a universal Turing machine), then this system is usually referred to as Turing universal. A consequence of the noncomputability of the Halting Problem is that the long term behavior of Turing universal systems is highly complex (in a manner distinct from behaviors considered e.g. in chaos theory) and has some characteristics which are not computable (see e.g. [30]). However, in applications, it is often desirable that Turing universal systems are relatively simple and mathematically well-behaved so that they can be used in meaningful situations. For this reason, one might be interested in having properties such as low-dimensionality, reasonable smoothness, or robustness to perturbations for Turing universal systems.
In this paper, we investigate the problem of determining the lowest dimension n such that the analytic maps or analytic ODEs defined on can robustly simulate Turing machines.
It is well-known that piecewise affine and other types of maps and ODEs can simulate Turing machines on , see e.g. [2,3,8,9,20,21,23,24,26,30]). However, some authors have claimed (see e.g. [1,5,25,25,28]) that, when focusing on more physically realistic systems simulating Turing machines, one might desire other additional attributes such as robustness to noise (it is known that the addition of noise to some classes of systems reduces their computational power, see e.g. [1,28]) or smoothness of the dynamics since most classical physical systems are expressed with smooth (actually analytic) functions. In [25] the authors have shown that closed-form analytic maps are capable of simulating Turing machines with exponential slowdown in dimension one or in real time in dimension . In [18] it was shown that, under a certain notion of robustness (see Theorems 1 and 3 below), the class of closed-form analytic maps on as well as the class of ODEs defined with analytic closed-form functions in can robustly simulate Turing machines. We recall that closed-form analytic maps are analytic functions which can be expressed in terms of elementary functions such as polynomials, trigonometric functions, exponential and logarithmic functions, their compositions, etc.
In the present paper, we show that (a) one-dimensional analytic maps can robustly simulate Turing machine on (Theorem 9) in real time (i.e. without the exponential slowdown of [25]; the simulation in [25] is not robust to perturbations either); (b) two-dimensional analytic ODEs can robustly simulate Turing machines (Theorem 11), which reduces the dimension of the ODEs from 6 as in [18] to 2; (c) none of one-dimensional autonomous analytic ODEs can simulate (robustly or not) a universal Turing machine under certain reasonable assumptions; and (d) Turing machines can be simulated on the two-dimensional unit ball – a compact subset of – albeit only with functions. As mentioned before, results (a) and (b) improve the results obtained in [25] and [18], respectively. Result (a) is proved by simulating Turing machines directly using the technique introduced in [18] rather than simulating three-counter Minsky machines (which are Turing universal) with Collatz functions and then embedding Collatz functions in closed-form functions as shown in [25]. The direct simulation removes the exponential slowdown and ensures the robustness to perturbations. To prove result (b), we developed a dimension-reduction scheme that preserves robustness with respect to perturbations. The dimension-reduction is not a trivial matter due to the fact that and are not homeomorphic if and, subsequently, there is no continuous bijection between the two spaces. Result (d) further extends the results in [18] – valid only on unbounded spaces – by showing that Turing machines can be simulated on the two-dimensional unit ball. The proof of result (d) makes use of the ideas from [14]. Similar to what is done in [14], we show that there is a ODE which can simulate Turing machines over the compact set for . In [14], a polynomial flow (defined with a polynomial ODE) having Turing universality on for is first constructed and then this polynomial flow is used to construct a (Euler) partial differential equation which is Turing universal. And it is shown in [15] that there are Turing complete (stationary Euler) fluid-flows on a Riemannian 3-dimensional sphere. The difference between our result (d) and the results of [14,15] is that we use ODEs instead of partial differential equations (for the case of [15]), and result (d) is for instead of or as in [14,15], respectively.
The outline of the paper is as follows. In Section 2 we review the construction presented in [18] to create analytic maps on which can robustly simulate Turing machines. In Section 3 we present some auxiliary functions. Building on these results, we show in Section 4 that one-dimensional analytic maps can robustly simulate Turing machines. By iterating these maps with ODEs, we are able to show in Section 5 that two-dimensional ODEs can robustly simulate Turing machines. In Section 6, we construct a ODE that can simulate Turing machines over the compact set . Finally, in Section 7 we show that under reasonable hypothesis, no one-dimensional analytic ODE can simulate a universal Turing machine.
Simulating Turing machines in dimension three
In this section, we review several results from [18] which are useful for proving our main results.
We first recall some basic results from computability theory (see e.g. [33]). Given a finite set Σ (the alphabet), a word over Σ is a finite sequence for some (k is the length of the word), where is the set of all non-negative integers. Note that there is a special sequence, represented by ϵ, which denotes the word of length 0. As usual, for notational simplicity, we will denote the word simply as . The set of all words over Σ is denoted by . We also recall that a Turing machine is a discrete dynamical system defined by the iteration of a map, although it is usually viewed as a finite-state machine since this approach is often more convenient. More specifically, let Σ be an alphabet, and take some symbol , which is usually known as the blank symbol, and let Q be a finite set known as the set of states with some special elements , called the initial state and the final state, respectively. Then a Turing machine M is a map that works as follows when viewed as a machine. It has a bi-infinite tape, divided into cells, and a head which is associated to some state of Q. Given some (the configuration of the Turing machine), where and , then the tape contents of the Turing machine at this configuration is
while its associated state is q. In this case the Turing machine is also said to be reading symbol . Then, depending only on the value of the current state and of the symbol being read by the head, the machine simultaneously (i) updates its state, (ii) updates the symbol being read by the head and (iii) either moves the head one cell to the right, one cell to the left, or maintains the head on the same position.
A Turing machine M computes a function as follows. Given a word w it starts its computation on the initial configuration , i.e. in the initial configuration the state is the initial state and the tape contains the input w only. Then M proceeds with the computation until it reaches the halting state . In this case we say that the Turing machine has halted with configuration . In this case its output will be , i.e. . If M does not halt with input w, then is undefined.
Given some Turing machine M as described above, let and take an injective map with . Let be the current configuration of M and let us further assume that M has m states, represented by the numbers , and that if M reaches an halting configuration, then it moves to the same configuration (i.e. ). Take
and suppose that q is the state associated to the current configuration. Then encodes unambiguously the current configuration of M. Under these assumptions, the transition function of M can be encoded as a function . In [18] it was shown that can be extended to a function , which has the following properties: (i) it is capable of simulating M in the presence of perturbations; (ii) the function f is analytic, and each of its components can be expressed using only the following terms: variables, polynomial-time computable constants (see Remark 2 for a definition), +, −, ×, sin, cos, arctan. The precise statement of this result is given below, where for a function , for , and denotes the kth iterate of the function , which is defined as follows: , .
Letbe the transition function of a Turing machine M under the encoding described above, and let. Then ψ admits a globally analytic closed-form extensionsuch that the expression of each component ofcan be written using only the following terms: variables, polynomial-time computable constants, +, −, ×, sin, cos, arctan. Moreover,is robust to perturbations in the following sense: for all f such that, for all, and for allsatisfying, whererepresents a configuration according to the encoding described above,
We note that the proof of this theorem is constructive and that can be obtained explicitly. A continuous-time version of Theorem 1 was also proved in [18].
We note that we can define computable real constants and computable real functions using the approach of computable analysis. Hence the functions given by Theorem 1 are computable in the computable analysis sense. Computation in the setting of computable analysis is performed by computing with a discrete model over a (infinite) representation of a real number, a real function, etc., while computation as described in Theorem 1 uses an analytic function defined over a real space without making use of any discrete model. However, it can be shown that the apparent different approaches are in fact computationally equivalent [4,7,18]. We also recall that the notion of a computable real number or of a computable real function in the setting of computable analysis can be presented in several equivalent but different ways. For example, according to the approach presented in [22] (see also [10]), a number is computable if there is a Turing machine M that, on input , outputs (in finite time) a rational with the property that . If the Turing machine M runs in polynomial time (in n), then we say that c is computable in polynomial time. Similarly, a function is computable if there is an oracle Turing machine M that computes in the sense that, given as input and any oracle recording (i.e. with the property that ), M outputs a rational number such that . A real function is -computable if f and its derivative are both computable. These notions can be generalized to in a straightforward manner.
Letbe the transition function of a Turing machine M under the encoding described above; let; and let. Then there exist
satisfying, which can be computed from ψ, ε, δ, and
an analytic closed-form functionwhich can be written using only the following terms: variables, polynomial-time computable constants, +, −, ×, sin, cos, arctan
such that the ODErobustly simulates M in the following sense: for all g satisfyingand for everythat encodes a configuration according to the encoding described above, ifsatisfy the conditionsand, then the solutionofsatisfies, for alland for all,where, withand.
Some useful auxiliary functions
In this section, we present several functions and results which are needed in subsequent sections. In a first reading, the reader can skim through the results without going into the proofs.
The function Υ presented in the next lemma can be seen as a generalization of the error-correcting function from [18, Lemma 9]. More specifically, the function Ψ can be viewed as a function that improves the accuracy of approximations within distance of an integer (the function of [18, Lemma 9] has a similar property, but only works for the integers 0 and 1), where the correction factor is bounded by , and is the second argument of Ψ.
Letbe given by. Thenwheneverfor someand.
Let be defined by . We note that, since has period 1, if for some . However, although it is continuous, the function is not analytic, since it is well-known that if an analytic function is constant in a non-empty interval, e.g. , then it should be constant everywhere on the real line , which is not the case for . The problem is that, although the composition of analytic functions yields again an analytic function, the derivative of is not defined when or and thus is not analytic when or for some . Note, however, that arcsin is analytic in . Hence, we can multiply by a value (or , which will be more convenient later on), which is slightly less than 1, to ensure that the resulting function Ψ is analytic, since in this way we guarantee that for any and . Next we notice that, by the mean value theorem
Let us now take . We note that and that . Hence we conclude that g strictly increases in , which implies when . This implies that for , where is arbitrary, we have
□
We now present another error-correcting function which was first presented in [18, Proposition 5]. This function is a uniform contraction around integers. Unlike Ψ, one cannot prescribe the amount of error reduction around each integer with a single application of the map σ. On the other hand its use is not restricted to a -neighborhood of integers and can be used on larger neighborhoods. This last property will be handy later on.
Letbe the function defined by. Let. Then there is some contracting factorsuch that,,,.
The constants can usually be explicitly obtained. For example, as shown in [18], we can take .
It is well known that there are bijective functions from to . An example (see e.g. [32, pp. 26–27]) is the dovetailing pairing map defined by the formula
Using this map we can obtain a bijective map , for , by defining recursively: ; . We now show that the maps can be extended to robustly around the integers. Since each is a (multivariate) polynomial, to achieve this objective we have to analyze how the error is propagated via the application of a polynomial map. The following lemma is from [6], and can be viewed as an extension of a similar result proved in [18, Lemma 11] for the case of monomials. For multivariate polynomials, the multi-index notation is used for compactness as follows: a monomial is represented by , where , , is the degree of the monomial, and the degree of a (multivariate) polynomial is the maximum degree of all the monomials which appear in its expression.
Letbe a multivariate polynomial of degree k and letbe such thatfor some. Thenwheredenotes the sum of the absolute values of the coefficients of P.
Now we are ready to state the result that shows the existence of robust analytic extensions of for each k.
For each,, there exists an analytic functionwith the following properties:
If, then;
For any, if there is somesuch that, then.
We start with the case . Since
it is clear that the function is well-defined for all . In the remaining of this proof, we assume that is defined over . Since is a polynomial of degree 2, by Lemma 6 we conclude that
Since for all , it follows that
Set
where . As a composition of analytic functions, is clearly analytic. If , it is trivial to verify that , which implies property 1. For property 2, let us assume that for some . Using Lemma 4 and the inequality for all , we obtain the following estimate, where :
Recall that, on , denotes the Euclidean norm while denotes the maximum norm. Since and , it follows that , which further implies that
Then it follows from this inequality, (5), and (6) that
which proves property 2 for .
For the case where , the result is obtained inductively by setting
Property 1 is immediate; property 2 follows from the estimate below:
□
As shown above, provides a bijection between and that can be robustly extended to an analytic function . We now show that the inverse function of can also be robustly extended to an analytic function from to . We write , where . The following result shows that can be robustly extended to an analytic function from to .
For each,, and for each, there exists an analytic functionwith the following property: for any, if there is somesuch that, then.
First we prove the result when . Let us assume that (the case where is similar). Then, by definition, . Since for or, more generally, for all (see e.g. [32, p. 27]), we have the following algorithm to compute , given some input :
For all
For all
If , then output i
Next j
Next i
This algorithm always stops with the correct result. Hence can be computed by a one tape Turing machine M. Furthermore, using well-known techniques, we can assume that M has the following properties: (i) the tape alphabet of the Turing machine is where B denotes the blank symbol; (ii) the input alphabet is ; (iii) each input and the respective output of the computation is represented in unary, i.e. by a sequence of z 1’s; and (iv) is computed by M in time , where P is a polynomial which can be explicitly obtained and which is assumed to be an increasing function. Regarding condition (i), we notice that there are universal Turing machines which only use the alphabet and hence we do not lose computational computational power with respect to Turing machines using more symbols. For example, if we have a Turing machine which tape alphabet has symbols (including the blank symbol B), then we can create a Turing machine with tape alphabet which simulates by taking some fixed satisfying such that each symbol of is represented by distinct strings (blocks) of of length l, with the exception of the blank symbol of which is represented by a block of l blank symbols in . By its turn, can be simulated by a Turing machine with tape alphabet by coding each symbol of as a string of length 2 in , e.g. by coding 0, 1, and B as , 11, and , respectively. We note that regarding condition (iv), the expression of P depends on the exact implementation details of M, but we prefer to omit the exact description of M and of P for brevity (these can be obtained as usual, although the procedure is a bit tedious and hence not of much interest for this proof).
Let be the function given by Theorem 3 such that simulates M (taking in that theorem), and let be the associated constant such that (3) holds. (The value of δ in Theorem 3 is not really relevant; one may simply take ).) Let be chosen such that (see Lemma 5). Given an input for the Turing machine M, let us assume that this input is encoded in unary (i.e. x is represented by a sequence of x 1’s) when processed by M. We can then transform this unary coding of x into another integer value via the coding (2), where and , which can then be used to create an initial condition for such that this IVP simulates M with input x. Note that although and , we do not necessarily have . Since initially the tape will be empty, with the exception of the input, and M will be on its initial state, which we assume to be the state 1 (we can assume, without loss of generality, that the states of M correspond to the elements of ), then the initial configuration of M will be coded as . Let denote the solution of with initial condition associated to the configuration and let be the projection for . Note that Φ is analytic and that M computes . We will use these facts to create the function to be defined as for some analytic functions , yet to be defined, which essentially translate the value of into the coding (2) of its unary representation (case of ) and, reciprocally, converts the coding of the unary representation back to the number encoded by this representation (note again that may not be equal to the number encoding the symbolic representation – unary, binary, etc. – of x given by (2)). Since and P is assumed to be increasing, it follows that and . Hence, if implies that , we get that will return the coding of the output of M with the input encoding the number (note that although the relation (3) is in general valid only in intervals of the format with , but since we have assumed that the image of an halting configuration is itself, it follows from the results of [18] that (3) is valid for all times after the Turing machine has halted. See also Remark 15). We now only have to define the functions and . Let us now first turn our attention to . Note that given some , the number will represent n in unary when using the coding (2) (taking , since by definition, and by taking ). Hence it makes sense to take . However, we cannot take to be , because in that case we cannot ensure that implies . To avoid this problem, we improve the accuracy of x using the function Ψ from Lemma 4, obtaining an improved estimate satisfying . We now determine the accuracy improvement needed to achieve this objective. Note that the exponential function is strictly increasing and thus, by the mean value theorem, we have
Hence, if we have , we get . This is achieved if , due to Lemma 4 and from the property that . Hence we can take .
We now proceed with a similar reasoning for . We first note that if codes the exact output of M according to (2), and thus represents in unary some number , we will have as we have already seen. This implies that . Now we have to analyze again the effect of replacing n by some real value x satisfying . By the mean value theorem, we have (note also that since )
Therefore, to ensure that implies that , it is enough to take (using Lemma 4) or (using Lemma 5 and noting, as mentioned in [18, Remark 6], that we can take ).
Proceeding similarly for the case of , we conclude that , where is a TM machine computing which is similar to M, with the difference that in Step 3 of the pseudo-algorithm above we take “If , then output j”. The results for follow inductively. □
We now present one of the main results of this paper. Let M be a one-tape Turing machine and let be the encoding of a configuration as given in Section 2 and (2). In what follows each configuration is encoded in the single value
Thus we can consider that, under this new encoding, the transition function of a Turing machine is a map .
Letbe the transition function of a Turing machine M, under the encoding described above, and let. Then there is an analytic functionthat robustly simulates M in the following sense: for all g such that, and for allsatisfying, whererepresents some configuration, one has for all
Most of the work to prove this theorem was already done in Section 3. The idea is to compose the robust simulation of Turing machines of Theorem 1 from to with the map (which allows to go from dimension 3 to 1) and its inverse (which allows to go back from dimension 1 to 3). Since all involved functions are robust to perturbations, the same can be said to their composition. Hence, the composition will provide a robust simulation of Turing machines from to .
We now present the details. Let us first define a function that robustly simulates M in a weaker sense that just the input can be perturbed and not itself. More specifically, let us define a function with the following property: for all satisfying , where represents some configuration, one has for all
To achieve this purpose, let be the corresponding 3-dimensional map simulating M obtained via Theorem 1 with . Then we take
It then follows from Theorem 1, Proposition 7, and Proposition 8 that property (8) is satisfied. We now only have to take care of the perturbations to . Let σ be the function defined in Lemma 5. Let be some integer such that and take
Then, by property (8) and Lemma 5, if satisfies , where represents some configuration, one has
If , then we conclude that
By using this last inequality and by iterating g and ψ, we conclude that the property (7) holds. □
In the statement of Theorem 9, we could have picked some fixed satisfying and, instead of assuming that , we could have assumed that and required that for condition (7). To see this it would be enough to compose with , where σ is given by Lemma 5 and is such that , with .
Analytic two-dimensional ODEs can robustly simulate Turing machines
In this section we construct an analytic two-dimensional ODE that robustly simulates Turing machines in the sense of Theorem 3. To prove this result, we simulate the iteration of the one-dimensional analytic function provided by Theorem 9 using a two-dimensional analytic ODE. Then it follows from Theorem 9 that this ODE will simulate a TM. The approach is similar to that used in [18]. More precisely, the following theorem is proved in this section.
Letbe the transition function of a Turing machine M, under the encoding described in Section
4
, and let. Then there exist:
satisfying, which can be computed from δ; and
an analytic function
such that the ODErobustly simulates M in the following sense: for all g satisfyingand for allwhich encodes a configuration according to the encoding described above, ifsatisfy the conditionsand, then the solutionofsatisfies, for alland for all,where.
The remaining of this section is devoted to the proof of Theorem 11. We first present the main ideas in [18] for simulating the iteration of a map defined over the integers, which admits a robust analytic real extension, using an analytic ODE. The basic idea is to simulate the iteration of a map f (in our case the transition function of a Turing machine M given by Theorem 9) using a two dimensional ODE with solution , . In each time interval , , one of the components will be fixed on the first half unit interval – serving as a “memory” of the result obtained most recently – to allow the other component to be updated from to its correct value . In the second half unit interval the roles of the components are reversed. Hence, at time both components will have the value (see Fig. 1). Since this procedure repeats itself for subsequent time intervals, one will be able to simulate a Turing machine with an ODE. The fact that we will be using analytic functions poses additional challenges. The challenges are to be overcome by using the robustness to perturbation of the function from Theorem 9.
Iterating the exponential function with an ODE.
We begin with a construction that uses an analytic ODE to approximate a value in a finite (given) amount of time with some (given) accuracy. This construction will be needed to derive the ODE simulating the iteration of the map. Consider the following basic ODE
which was already studied in [11,13], [18, Section 7]. The ODE can be easily solved by separating variables, which gives rise to the following result.
Consider a point(the target), some(the targeting error), time instants(departure time) and(arrival time), with, and a functionwith the property thatfor alland. Then the IVP defined by (
9
) (the targeting equation) with the initial conditionandhas the property thatfor, independently of the initial condition.
However, since we wish the ODE simulating Turing machines to be robust to perturbations, we have to analyze a perturbed version of (9).
Consider a point(the target), some(the targeting error), time instants(departure time) and(arrival time), with, and a functionwith the property thatfor alland. Letand let,be functions with the property thatandfor all. Then the IVP defined bywith the initial condition, where c satisfies (
10
), has the property that, independently of the initial condition.
Proceeding along the lines of the argument presented in [18], we now show how the map given by Theorem 9 can be iterated by a 2-dimensional ODE. Although our objective is to obtain an analytic function defining an ODE which simulates a given Turing machine M, in a first step we iterate the map given by Theorem 9 by using a non-analytic ODE.
Following the approach provided in [12, p. 37], let be the function defined by
Next we define the function given by
where
The function v has the property that , whenever . We now get the following lemma.
Thefunctiondefined byhas the property that, whenever, for all integers n.
Note that the function r can be seen as a function that returns the integer part of a real number around a -vicinity of an integer.
We now consider the ODE
where is an extension of the function , and is a constant yet to be defined. We will next show that (14) iterates the map f near integers. Its behavior is depicted in Fig. 1 when iterating the exponential function . Suppose that . Then and thus and . In this manner, the first equation of (14) behaves like the targeting equation (9), where , , , and and has to satisfy the condition (10) for c. Now note that and thus when , which implies that
This implies that
Therefore, due to Lemma 12 and (10), if we take the first equation of (14) becomes a targetting equation on the time interval associated to a targetting error γ. In particular, if we pick , then we can pick such that (10) holds and thus
On the time interval , the roles of and are switched: we will have which implies that for all . We thus conclude that for and therefore the second equation of (14) behaves like the targeting equation (9) with , , , and and . Again, using Lemma 12 and similar arguments as in the previous case, we conclude that
In the following time interval , the cycle repeats itself and we have and thus . Using a similar reasoning, we conclude that for all we have for all , (assuming ) and for all .
We thus have shown how to iterate (the extension of) a discrete function with an ODE. Nonetheless, the ODE is still not analytic as required. Remark that if the ODE is analytic, then and cannot be 0 in half-unit intervals, since it is well-known that if an analytic function ( and in our case) takes the value zero in a non-empty interval, then this function has to be identically equal to 0 on all its domain. Therefore, instead of requiring that and take the value 0 in alternating half-unit intervals, we require that these functions take values very close to zero. Since the map given by Theorem 9 is robust to perturbations on its input, this will ensure that the whole simulation of with a two-dimensional ODE can still be performed, even if and are not strictly constant in the half-intervals and , respectively. However, we still have to ensure that and are sufficiently small in the half-unit intervals of interests to guarantee that the iteration can be carried faithfully. To better understand how this can be achieved, we have to analyze the effects of introducing perturbations in (14), with the help of Lemma 13 since now the “targets”will be slightly perturbed.
Proceeding as in [18], the non-analytic function in the first equation of (14) is replaced by an analytic periodic function with period 1 which is close to zero when . As shown in [18], this can be done by considering the function s defined by
which ranges between 0 and 1 in (and, in particular, between and 1 when ), and between and 0 on the time interval . Then we take the analytic function defined by
we conclude that (assuming that ) and for all (i.e. y allows us to provide an error bound for in the time interval ). Since ϕ has period 1 on t, we conclude that and for all , where is arbitrary and . Therefore ϕ satisfies the assumptions of the function ϕ in Lemma 13 on the time interval .
We can now proceed with the main construction that simulates the iteration of the map given by Theorem 9 with an analytic ODE. Take to be a value such that , and let be the map given by Theorem 9 (use as value for δ in the statement of the Theorem 9 the value , where ). Consider the ODE given by
where , with initial conditions , , where are approximations of some initial configuration satisfying and , is such that (see Lemma 5), and
and , are constants associated to a targeting error of value γ (i.e. they are chosen such as the constant c in (10) and by noting that , we can take ). Note that, since ϕ satisfies the assumptions of function ϕ in Lemma 13, the same will happen to and . The ODE (16) simulates the Turing machine M similarly to the ODE (14), by iterating . However (17) has a more complicated expression, since it has to deal with the fact that and are not exactly zero in half-unit intervals.
Since we want that the ODE to robustly simulate M, let us assume that the right hand-side of the equations in (16) can be subject to an error of absolute value not exceeding δ. To start the analysis of the behavior of (16), let us first consider the time interval . Since for all , we conclude that is less than . This implies, together with the assumption that in (17) is perturbed by an amount not exceeding δ, that for all which implies that for all . Since the initial condition satisfies where , we conclude that
which implies that
Due to Theorem 9, we conclude that
Since and , we get that for all . Then the behavior of is given by Lemma 13 and
In the next half-unit interval the roles of and are switched as before and one concludes, using similar arguments to those used in the time interval that for . Therefore for all . This inequality together with (18) yields that
Since , we conclude that and Lemma 13 gives us
On the time interval , the roles of and are again switched. There we will have for all which implies that for all . This inequality together with (19) gives us
We thus conclude that this analysis can be repeated in subsequent time intervals and thus that for all , if then . This concludes the proof.
From the proof of Theorem 11, we conclude that if the Turing machine halts after steps with configuration and if we assume that , then for any satisfying , we have
Furthermore, on the half-unit time interval , we will get that
for . Assuming that in Theorem 11, we then conclude from (16) that starts its trajectory from a value -near to and will monotically converge to a value which, although may change with time, will never leave an -vicinity of for . This implies that
for all . Since (20) holds on as we have seen from the proof of Theorem 11, we conclude that (20) holds for .
Simulating Turing machines over compact sets
So far all our simulations of Turing machines are carried out over the non-compact set . In this section we show that it is possible to simulate Turing machines with ODEs on the 2-dimensional compact sphere . The technique used in the construction is based on a similar result proved in [14]. It is shown in [14] that there is a computable polynomial vector field on the sphere simulating a universal Turing machine; in other words, the polynomial vector field is Turing complete, where is arbitrary. The underlying idea of the construction presented in [14] is to map a vector field defined in to using the stereographic projection, and to remove the singularity at the north pole by using a suitable reparametrization on the polynomial vector fields. We show in this section that the dimension can be lowered from to at the cost of using a non-polynomial vector field. This is done by using the stereographic projection map applied to the function of Theorem 11. However, since is not polynomial, a different technique from that of [14] will have to be used to remove the singularity at the north pole, and that technique only works for vector fields. It would be interesting to know if the simulation of a Turing machine on can be achieved with an analytic vector field.
The notion introduced in the following definition will be used throughout this section.
Let , where , with . Given an expression , we say that f is bounded by a constant on the variables and bounded by a polynomial on the variables if
for all in the domain of f.
For example is bounded by a constant on t and polynomially bounded on x and is bounded by a constant on t (to simplify notation, in this latter case where h is not polynomially bounded on any other variables, we will just say that h is bounded by a constant). Some functions which are bounded by a constant include sin, cos, arctan.
The next result shows when a Turing universal vector field can be defined on .
Letbe a-computable ODE simulating a Turing machine M, whereis afunction with the property that both f and all its partial derivativesare bounded by a constant on t and are polynomially bounded on the variables, assuming that the argument of f is, where,, and. Then from f one can compute avector field F defined onthat also simulates M.
We recall that the (inverse) stereographic projection is given by
where . Suppose that . Then we can write the vector field defined by f on as
We recall that if is a map between two manifolds and , then for each the map g induces a linear map from the tangent space of M at p to the tangent space of N at . We also recall that forms a basis for and, similarly, if are coordinates for , then forms a basis for . Moreover, the matrix that (locally) defines the linear map , relative to the bases and , is the Jacobian of g. In the case of the map φ, and if we take as coordinates for , we obtain the following (note that the variable t in the expression of f can be seen as a fixed parameter):
where is evaluated at . This implies that is a vector field of class , except at the north pole of where it is not defined. Let us now consider the following ODE
where is such that for any and , . Since , τ is strictly increasing and thus τ admits an inverse . Next we note that if , where x is a solution of (21) and , we have that
It is not difficult to see that if is a solution for (23), then is also a solution to (24). Since the solution of the ODE (23) is unique, by the Picard-Lindelöf theorem, we conclude that . Furthermore, since for any , we conclude that any solution curve of (21) with initial condition also provides a solution curve for the last n components of the solution of (23) with initial condition , , up to some time reparametrization, and vice versa.
Thus, by taking , we conclude that the solution curves of
and of (21) are the same, up to a time reparametrization τ given by the ODE . Note that the right-hand side of (25) is formed by -computable functions, which means that the solution to (25) is also computable, since the solution to a -computable system is also computable [16,19]. Hence, when simulating Turing machines, if the result of the nth step of the computation of the Turing machine being simulated by (21) can be read in the time interval , then the result of the nth step when the simulation is performed by (25) can be read on the time interval . Note that can be computed from τ and hence from f. Indeed, we know that the derivative of is given by
Hence can be obtained as the solution of the initial-value problem (IVP) defined by , . Since the right-hand side of the ODE defining this IVP is computable from x and hence from f, we conclude that is computable from f [16,19]. In particular, if f is computable, then so is .
We now have (we can again assume that t is a fixed parameter for h, where h is given by (25))
From (22) we conclude that (note that )
This latter result implies that
Similarly, if we assume that
where are functions, from (22) and from the assumption that all the partial derivatives of f of the form are polynomially bounded on , we can conclude that each partial derivative of is polynomially bounded by some polynomial , which implies that
Therefore we can extend to a vector field defined on the entire sphere if we assume that the value of and of its partial derivatives is 0 at the north pole of . We thus have defined a vector field on the entire sphere , and is Turing universal. □
With the help of the above theorem, we may hope we could just make use of the vector field of Theorem 11 as the vector field f in Theorem 17 to prove that there is a Turing universal vector field in . However, there are several problems with this approach as listed below: (1) the approach requires that and all of its partial derivatives are bounded by a constant on t and are polynomially bounded on and . A major problem in this respect is that uses in its expression the function Ψ defined in Lemma 4 that does not necessarily have polynomially bounded derivatives because the function arcsin is used in the definition of Ψ and the derivative of arcsin is not polynomially bounded as its argument approaches or 1. (2) The expression of relies on the expression of the function given by Theorem 3. Thus one must show that is bounded polynomially on , , , , , . (3) The argument of the functions from Proposition 8 is provided as the initial condition of an ODE. It is not straightforward to analyze the dependence of and of its derivatives on its argument.
In the following we present the solutions to the listed problems. First we note that in Theorem 17 the vector field is no longer required to be analytic (it only has to be ). Therefore we can substitute the function Ψ defined in Lemma 4 by the function defined in Lemma 14. We recall that the function r has the property that , whenever , for all integers n. Thus if we take , the properties stated for Ψ in Lemma 4 remain true. Therefore, we can replace Ψ with r when defining the vector field of Theorem 11. In this case, the properties stated in Theorem 11 remain true with being a function rather than an analytic function. However, we gain the advantage that r and its derivatives are polynomially bounded as we shall show now. Indeed, it follows from its definition that (recall that ). For the derivatives of θ, we note that if , then it is readily seen by induction that for each there is a polynomial such that , with (and thus ). This implies that and , where is the constant term of . Therefore, by definition of the limit, there exists such that whenever and whenever . Now set . Then for all , which implies that θ in (12) as well as its derivatives are polynomially bounded on . Consequently, the function v from (13) as well as the derivatives of v are polynomially bounded following Lemmas 18 and 19 to be presented in a moment. Lemma 14 together with Lemmas 18 and 19 then imply that r as well as its derivatives are polynomially bounded.
Some notations are in order for the statements of the next two lemmas. Given multi-indexes , and , let
Suppose thatarefunctions which are bounded by a constant on the variablesand are bounded by a polynomial on the variables, as well as all their partial derivatives. Then:
Thefunctiondefined byis bounded by a constant on the variablesand bounded by a polynomial on the variables, as well as all its partial derivatives.
Thefunctiondefined byis bounded by a constant on the variablesand bounded by a polynomial on the variables, as well as all its partial derivatives.
Let be a multi-index. For point 1, we note that
and thus the result follows immediately from the assumption.
For the product , the claim follows directly from the general Leibniz rule for multivariate functions (see e.g. [17, Proof of Lemma 2.6]):
□
Suppose thatandarefunctions with the following properties:
f and its partial derivatives are polynomially bounded on its arguments;
g and its partial derivatives are bounded by a constant on the variablesand bounded by a polynomial on the variables.
Thenis afunction with the property thatas well as all its partial derivatives are bounded by a constant on the variablesand by a polynomial on the variables.
To prove this theorem, we will use a multivariate version of the Faà di Bruno formula which allows us to compute the higher order partial derivatives of the composition of multivariate functions f and g. Some notational matter is in order first. Let be a multi-index. Then following the approach of [27], let us assume that regardless of whether χ is a number or a differential operator. We say that a multi-index α can be decomposed into s parts with multiplicities if the decomposition holds and all parts are different. In this case the total multiplicity is defined as . The list is called a d-decomposition, or simply just a decomposition, of α. Then, assuming that and , we have
where is the set of all decompositions of α. From this later formula and the hypothesis on f, g we conclude that is a function with the property that as well as all its partial derivatives are bounded by a constant on the variables and are bounded by a polynomial on the variables . □
Since the function of Theorem 1 can be written using only the following terms: variables, polynomial-time computable constants, +, −, ×, sin, cos, arctan, we conclude from Lemmas 18 and 19 that as well as all its partial derivatives are bounded by a polynomial. Furthermore, as the function from Theorem 9 is obtained using the functions , , , , , σ, again by Lemmas 18 and 19 it suffices to show that , , , , σ as well as their partial derivatives are (or can be made) bounded by a polynomial. The case of the function σ in Lemma 5 is immediate from Lemmas 18 and 19. The case of can be treated by replacing in the expression of given in the proof of Proposition 7 by the function r, as explained above. Then it follows immediately that maintains its properties given by Proposition 7, except analiticity ( will only be ) and, meanwhile, Lemmas 18 and 19 imply that and its partial derivatives are polynomially bounded.
The situation for , , is more subtle, as the arguments to these functions are passed as initial conditions of an ODE. What we are going to do is to create new functions , , such that these new functions maintain the useful properties of , , on the one hand and, on the other hand, the new functions together with their partial derivatives are polynomially bounded. Once this is done, the old functions , , can then be replaced by the new functions , , in the expression of in the proof of Theorem 9. The function as well as its partial derivatives are now polynomially bounded on all variables except the time t. But since the time variable only appears inside the functions and defined by (17) in the format of as defined in (15), and and its derivatives are obviously bounded by a constant, it follows that the theorem below holds true.
Letbe the transition function of a Turing machine M, under the encoding described in Section
4
. Then there existand afunctionsuch that the ODEsimulates M in the following sense: for allwhich encodes a configuration according to the encoding described above, ifsatisfy the conditionsand, then the solutionofsatisfies, for alland for all,where. Furthermoreand its partial derivatives are polynomially bounded onandand bounded by a constant on t.
Let M be a Turing machine. Then one can compute from f avector field F defined onwhich also simulates M.
It remains to show that the new functions , , can be constructed such that they retain the useful properties of , , , but these new functions and their partial derivatives are polynomially bounded. We begin with a preliminary lemma.
Letbe afunction such that f and its partial derivatives are polynomially bounded. Suppose thatis the first coordinate of a solution x of the IVPIf x is polynomially bounded, then all the derivatives ofare polynomially bounded.
We show the result by induction on the order of the derivative by showing that , where is a function which is polynomially bounded, as well as all its partial derivatives. Then we will conclude that is polynomially bounded as well as all its partial derivatives by Lemma 19. The base case
is trivial. Let us now assume that , where is polynomially bounded as well as all its partial derivatives. Then
By taking , we conclude that and by Lemmas 18 and 19 we conclude that is polynomially bounded as well as all its partial derivatives, thus showing the result. □
To define new functions , , as in Proposition 8, we recall that the key point of the proof of Proposition 8 was to consider the bijection given by (4) and to obtain real extensions of the components and which form the inverse function of I, i.e. . Then the result would follow inductively when obtaining extensions from for . Subsequently, the only required modification is to obtain suitable real extensions , of , , respectively. We shall demand that if , then whenever for , so that has the same properties as of regarding Proposition 8, except that is instead of analytic. We also require that and its derivatives are polynomially bounded. To obtain , we first construct a function with the property that whenever for , and as well as its partial derivatives are polynomially bounded. By setting , where σ is given by Lemma 5, we conclude from the above and from Lemmas 18 and 19 that has the desired properties. Before defining and , we note that I is obtained by dovetailing by enumerating the pairs in the diagonals below from the (one element) diagonal starting on and then moving to the next diagonal
In other words, we have , , , , and so on. We note that the sum of the coordinates in each diagonal is constant. From here we see that the graphs for and , provided in Figs 2 and 3, respectively, have certain regularities which will be explored to obtain and .
Graph of the function . Since the function is discrete, the image are only the blue points (the red line is given as a visualization helper).
Let us start with the case of . We first analyze the behavior of . Let us suppose that the argument z of codes a pair at the start of the diagonal with sum n. Then , , …, , , , …Thus to simulate we need to track the sum s of the diagonal, and increase it by one when reaches the value of s. On the next value , we will have that will take the value 0, and each time its argument z increases by one, also increases by one, until it reaches the (new) value of the sum of the diagonal and the cycle repeats itself. We will simulate this behavior with ODEs. Before showing how this can be done, consider the auxiliary function defined as
where and . It is not difficult to see that when . Hence we have that whenever , when and when . Furthermore ξ is and ξ and all its derivatives are polynomially bounded due to Lemmas 18 and 19.
Graph of the function . Since the function is discrete, the image are only the blue points (the red line is given as a visualization helper).
Let us now present the ODE which will define
with and . The behavior of the ODE (27) is similar to the one of (14). The variable updates are done on alternating time intervals. The variable stores the value of the function on time intervals with the format , i.e. we will have whenever , with . The variable will give the current sum of the diagonal on time intervals with the format . We first update the variables and on time intervals to be able to use the “memorized”values of and when updating and . We note that must be increased by one unit from its previous value (stored on ) until it reaches the value of the sum of the diagonal, which is stored in . On that moment we will have on the equation for (if the value of is less than the value of the sum of the diagonal stored in , then and is incremented by one) and will be reset to the value 0 starting the cycle again. The analysis for is similar: its value will be essentially constant as long as , which happens when . When , we will have and will be incremented by one from its previous value. We can see that the ODE (27) behaves as desired and that we can take . Since the right-hand sides of (27) are polynomially bounded as well as their derivatives and is also polynomially bounded, implying by Lemma 22 that and all its derivatives are polynomially bounded.
The case for is similar. Let us suppose that the argument z of codes a pair at the start of the diagonal with sum n. Then Thus to simulate we need again to track the sum s of the diagonal, but now we need to increase it by one when reaches the value 0. On the next value , we will have that will take the value , and each time its argument z increases by one, decreases by one, until it reaches 0 and the cycle repeats itself. This behavior can be simulated in a similar way to (27) by the following ODE
We can do an analysis to (28) similar to the one of (27) to conclude that we can take on (28). This concludes the proof of Theorem 20.
Can one-dimensional ODEs simulate Turing machines?
As we have seen in the previous section, analytic two-dimensional ODEs can robustly simulate Turing machines. But what about one-dimensional ODEs? In this section we show that no one-dimensional autonomous ODE can simulate a universal Turing machine under some reasonable conditions.
First let us give a more precise meaning to the notion of an ODE simulating a Turing machine. Let M be a Turing machine. Since ODEs are defined on , to simulate the Turing machine M with an ODE we first need to encode a configuration of M as a point of . However, since the coding of a configuration might not be unique, as it happens in the previous sections, we map each configuration to a set of possible encodings of that configuration. Hence we have to consider a map χ which maps configurations of M into non-empty subsets of . Then given a configuration , any point of is assumed to represent the configuration . In this manner we can consider the case when is represented by a single point in (when is a singleton) or when is represented by several points of . For example, in Theorem 9 we have assumed that any point in a -vicinity of , where and are given by (2) represents the configuration which is encoded by , i.e.
Note that it makes sense to assume that if and are distinct configurations, then . However, this assumption may be too weak, since even if nothing prevents e.g. that and are fractal (e.g. Cantor-like) sets which are intermingled and thus very hard to separate in practice. To avoid such undesirable instances we impose a natural separation-condition on χ so that and are separated by disjoint open subsets of . More precisely, let denote all configurations of a given Turing machine M (recall that a Turing machine has at most countably many configurations). Then we assume that there are two computable maps , such that for all , and, moreover, if then .
Now we say that the ODE
where , simulates a Turing machine with the coding χ if given an arbitrary configuration of M and some point one has that the solution y to (29) with initial condition satisfies for all , where ψ is the transition function of M. In the following, we show that no one-dimensional ODE can simulate a universal Turing machine under the separation-condition.
Let M be a universal Turing machine. Then no ODEcan simulate M in the sense explained above, whereis a computable function with only isolated zeros.
Let M be a universal Turing machine. We may assume that it has only one halting state and it cleans its tape immediately before it halts. This implies that M has only one halting configuration , ; moreover, the problem of deciding whether M halts on input w, , is undecidable.
Let us assume, by contradiction, that there is an ODE (29) which simulates M, where is a computable function. Then f must admit a zero in where and . Assume otherwise that this is not the case. Then since computable functions are continuous, it must be either for all or for all . Moreover, since is compact, it follows that . As a result, any solution starting on must leave it in time and never return to afterwards (note that a solution of (29) is a continuous function which must move continuously along the real line). But this is impossible because for all and (29) simulates M. Hence must contain at least one zero , which is computable because f is computable and the zeros of f are isolated (it is well-known that isolated zeros of computable functions are computable. See e.g. [10, Theorem 7.8]).
Let w be some input with the property that M halts on w, and suppose that the initial configuration associated to w is . Then (note that in an universal Turing machine the initial state cannot be an halting state). Hence, if , then . Let us assume without loss of generality that . We note that the solution of the IVP (29) with must reach because M halts on input w. This implies that for all . There are two cases to be considered:
for all . In this case, let .
for some . In this case, we must have , which implies that . By continuity of f there is some such that and . In this case, let (note that is computable because it is an isolated zero of a computable function).
If there is a word w such that M halts on input w with the property that there is some satisfying , we repeat the above procedure on the half line obtaining provided that for all or provided that for some , where is obtained similarly as in the previous case.
From the arguments above, we conclude that M halts on word w iff . We will use this fact to show that the halting problem is decidable, a contradiction. Let us assume, without loss of generality that (the cases where one or more extremities of I are unbounded is dealt with similarly). Suppose first that for all , . Then to decide whether M halts on input w proceed as follows. Given the initial configuration associated to input w, test whether by testing whether . Notice that, since , this test can be done in finite time. If the test suceeds, then accept w otherwise reject it.
Let us now suppose that and (the cases where (i) and for all , or (ii) and for all , can be treated similarly). Then we can take and and their respective output for the halting problem as constants used by the algorithm and, if or , we can output the correct result for these cases. More specifically, given an input w, compute the initial configuration associated to this input and compute its index . Then test if . If the test succeeds, then accept (reject) if M halts (does not halt, respectively) starting on configuration . Otherwise, test if . If the test succeeds, then accept (reject) if M halts (does not halt, respectively) starting on configuration . If both tests fail, test whether by testing whether . We note that in this case it must be , and thus this test can be done in finite time by checking if . If the test succeeds, then accept w; otherwise reject it.
In other words, if the ODE (29) simulates M, then we can decide the halting problem, a contradiction. □
Footnotes
Acknowledgements
D. Graça wishes to thank Marco Mackaaij and Nenad Manojlović for helpful discussions. D. Graça was partially funded by FCT/MCTES through national funds and when applicable co-funded EU funds under the project UIDB/50008/2020. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 731143.
References
1.
E.Asarin and A.Bouajjani, Perturbed Turing machines and hybrid systems, in: Proc. 16th Annual IEEE Symposium on Logic in Computer Science, 2001, pp. 269–278.
2.
O.Bournez, Achilles and the tortoise climbing up the hyper-arithmetical hierarchy, Theoretical Computer Science210(1) (1999), 21–71. doi:10.1016/S0304-3975(98)00096-6.
3.
O.Bournez and M.L.Campagnolo, A survey on continuous time computations, in: New Computational Paradigms. Changing Conceptions of What Is Computable, S.B.Cooper, B.Löwe and A.Sorbi, eds, Springer, New York, 2008, pp. 383–423.
4.
O.Bournez, M.L.Campagnolo, D.S.Graça and E.Hainry, Polynomial differential equations compute all real computable functions on computable compact intervals, Journal of Complexity23(3) (2007), 317–335. doi:10.1016/j.jco.2006.12.005.
5.
O.Bournez, D.S.Graça and E.Hainry, Computation with perturbed dynamical systems, Journal of Computer and System Sciences79(5) (2013), 714–724. doi:10.1016/j.jcss.2013.01.025.
6.
O.Bournez, D.S.Graça and A.Pouly, On the complexity of solving initial value problems, in: Proc. 37h International Symposium on Symbolic and Algebraic Computation (ISSAC 2012), 2012, arXiv:1202.4407.
7.
O.Bournez, D.S.Graça and A.Pouly, Polynomial time corresponds to solutions of polynomial ordinary differential equations of polynomial length, Journal of the ACM64(6) (2017), 38:1–38:76. doi:10.1145/3127496.
8.
O.Bournez and A.Pouly, A survey on analog models of computation, in: Handbook of Computability and Complexity in Analysis, Springer International Publishing, Cham, 2021, pp. 173–226. doi:10.1007/978-3-030-59234-9_6.
9.
M.S.Branicky, Universal computation and other capabilities of hybrid and continuous dynamical systems, Theoretical Computer Science138(1) (1995), 67–100. doi:10.1016/0304-3975(94)00147-B.
10.
V.Brattka, P.Hertling and K.Weihrauch, A tutorial on computable analysis, in: New Computational Paradigms: Changing Conceptions of What Is Computable, S.B.Cooper, B.Löwe and A.Sorbi, eds, Springer, 2008, pp. 425–491. doi:10.1007/978-0-387-68546-5_18.
11.
M.Braverman, Computational complexity of Euclidean sets: Hyperbolic Julia sets are poly-time computable, in: Proc. 6th Workshop on Computability and Complexity in Analysis (CCA 2004), V.Brattka, L.Staiger and K.Weihrauch, eds, Electronic Notes in Theoretical Computer Science, Vol. 120, Elsevier, 2005, pp. 17–30.
12.
M.L.Campagnolo, Computational Complexity of Real Valued Recursive Functions and Analog Circuits, PhD thesis, Instituto Superior Técnico/Universidade Técnica de Lisboa, 2002.
13.
M.L.Campagnolo, C.Moore and J.F.Costa, Iteration, inequalities, and differentiability in analog computers, Journal of Complexity16(4) (2000), 642–660. doi:10.1006/jcom.2000.0559.
14.
R.Cardona, E.Miranda and D.Peralta-Salas, Turing Universality of the Incompressible Euler Equations and a Conjecture of Moore, International Mathematics Research Notices (2021), rnab233. doi:10.1093/imrn/rnab233.
15.
R.Cardona, E.Miranda, D.Peralta-Salas and F.Presas, Constructing Turing complete Euler flows in dimension 3, Proceedings of the National Academy of Sciences118(19) (2021). doi:10.1073/pnas.2026818118.
16.
P.Collins and D.S.Graça, Effective computability of solutions of ordinary differential equations the thousand monkeys approach, in: Proc. 5th International Conference on Computability and Complexity in Analysis (CCA 2008), V.Brattka, R.Dillhage, T.Grubba and A.Klutsch, eds, Electronic Notes in Theoretical Computer Science, Vol. 221, Elsevier, 2008, pp. 103–114.
17.
G.M.Constantine and T.H.Savits, A multivariate Faa di Bruno formula with applications, Trans. Amer. Math. Soc.348(2) (1996). doi:10.1090/S0002-9947-96-01501-2.
18.
D.S.Graça, M.L.Campagnolo and J.Buescu, Computability with polynomial differential equations, Advances in Applied Mathematics40(3) (2008), 330–349. doi:10.1016/j.aam.2007.02.003.
19.
D.S.Graça, N.Zhong and J.Buescu, Computability, noncomputability and undecidability of maximal intervals of IVPs, Transactions of the American Mathematical Society361(6) (2009), 2913–2927. doi:10.1090/S0002-9947-09-04929-0.
A.Kawamura, H.Ota, C.Rösnick and M.Ziegler, Computational complexity of smooth differential equations, Logical Methods in Computer Science10(1:6) (2014), 1–15.
22.
K.-I.Ko, Complexity Theory of Real Functions, Birkhäuser, 1991.
23.
P.Koiran, A family of universal recurrent networks, Theoretical Computer Science168(2) (1996), 473–480. doi:10.1016/S0304-3975(96)00088-6.
24.
P.Koiran, M.Cosnard and M.Garzon, Computability with low-dimensional dynamical systems, Theoretical Computer Science132 (1994), 113–128. doi:10.1016/0304-3975(94)90229-1.
25.
P.Koiran and C.Moore, Closed-form analytic maps in one and two dimensions can simulate universal Turing machines, Theoretical Computer Science210(1) (1999), 217–223. doi:10.1016/S0304-3975(98)00117-0.
26.
O.Kurganskyy and I.Potapov, Computation in one-dimensional piecewise maps and planar pseudo-billiard systems, in: Proc. 4th International Conference on Unconventional Computation (UC 2005), Lecture Notes in Computer Science, Vol. 3699, Springer, 2005, pp. 169–175. doi:10.1007/11560319_16.
27.
T.-W.Ma, Higher chain formula proved by combinatorics, The Electronic Journal of Combinatorics16(1) (2009).
28.
W.Maass and P.Orponen, On the effect of analog noise in discrete-time analog computations, Neural Computation10(5) (1998), 1071–1095. doi:10.1162/089976698300017359.
29.
Y.Matiyasevich, Hilbert’s 10th Problem, The MIT Press, 1993.
30.
C.Moore, Generalized shifts: Unpredictability and undecidability in dynamical systems, Nonlinearity4(2) (1991), 199–230. doi:10.1088/0951-7715/4/2/002.
31.
Y.Moschovakis, Kleene’s amazing second recursion theorem, The Bulletin of Symbolic Logic16 (2010), 189–239. doi:10.2178/bsl/1286889124.
M.Sipser, Introduction to the Theory of Computation, 3rd edn, Cengage Learning, 2012.
34.
A.M.Turing, On computable numbers, with an application to the entscheidungsproblem, Proceedings of the London Mathematical Societys2–42(1) (1937), 230–265. doi:10.1112/plms/s2-42.1.230.