The document discusses the post correspondence problem and uses it to show that the halting problem is undecidable. It introduces the concept of mapping reducibility to show how one problem can be reduced to another to prove properties like decidability. Several examples are provided to illustrate mapping reducibility and how it can be used to prove that problems like the equivalence of Turing machines are neither recognizable nor co-recognizable.
This document discusses reducibility and the halting problem. It introduces reducibility as a way to convert one problem into another problem such that solving the second problem solves the first. The document then discusses the halting problem (HALTTM) in detail, proving it is undecidable through a reduction from the acceptance problem (ATM). It introduces computation histories as a method to prove reductions and discusses their use in showing languages like ALBA, ELBA, and ALLCFG are decidable/undecidable.
This document discusses undecidability and Turing recognizability. It begins by introducing the acceptability problem (ATM) and uses diagonalization to prove it is undecidable. It shows that while ATM is Turing recognizable, its complement is not, meaning ATM cannot be decided. It then proves that the set of Turing recognizable languages is countable but the set of all languages is uncountable.
This document summarizes key concepts from a lecture on decidability in formal language theory:
- Context-free languages (CFLs) are decidable as their acceptability can be determined by a Turing machine that simulates a pushdown automaton.
- The acceptability problem for context-free grammars (ACFG) - determining if a string is in the language of a given CFG - is decidable using a algorithm that lists all derivations.
- This shows that the class of languages recognized by Turing machines is decidable.
- However, diagonalization arguments show that some problems are undecidable, such as the halting problem of determining if an arbitrary Turing machine
1) Reducibility involves converting one problem into another related problem such that solving the second problem provides a means to solve the first problem.
2) Reducibility is used to prove that certain problems are computationally unsolvable by reducing them to known undecidable problems.
3) Examples of reduction are provided, including reducing the halting problem (ATM) to the emptiness problem (ETM), and using this to prove ETM is undecidable.
The document discusses the limits of computation and reducibility. It covers three key points:
1. It introduces different classes of languages based on whether they are decidable, recognizable, co-decidable, etc. and provides examples like EMPTY, ACCEPT, and ACCEPT_ε.
2. It explains the concept of reducibility and how solving one problem can be reduced to solving another. This is shown using examples like the halting problem and emptiness testing.
3. It proves several important theorems like Rice's Theorem, which states that any non-trivial property of Turing machine languages is undecidable. The halting problem and computation histories are also revisited.
This document provides an introduction and overview of a research paper on network synthesis for non-simultaneous requirements. It begins with an abstract describing how the paper will provide an introduction to matroid theory and the greedy algorithm to form the basis for an initial optimal network synthesis algorithm. It will then expand the algorithm to allow for non-uniform cost functions and explore generalizing the problem to allow for multiple commodity flows. The document provides definitions for key concepts like graphs, networks, requirements graphs, and formulates the network synthesis problem. It introduces matroids and the greedy algorithm, proving their relationship and showing how the greedy algorithm can be used to find optimal solutions for matroid problems. It provides an example matroid and greedy algorithm application.
1. Exact inference in Bayesian networks is NP-hard in the worst case, so approximation techniques are needed for large networks.
2. Major approximation techniques include variational methods like mean-field approximation, sampling methods like Monte Carlo Markov Chain, and bounded cutset conditioning.
3. Variational methods introduce variational parameters to minimize the distance between the approximate and true distributions. Sampling methods draw random samples to estimate probabilities. Bounded cutset conditioning breaks loops by instantiating subsets of variables.
1. Exact inference in Bayesian networks is NP-hard in the worst case, so approximation techniques are needed for large networks.
2. Major approximation techniques include variational methods like mean-field approximation, sampling methods like Monte Carlo Markov Chain, and bounded cutset conditioning.
3. Variational methods introduce variational parameters to minimize the distance between the approximate and true distributions. Sampling methods draw random samples to estimate probabilities. Bounded cutset conditioning breaks loops by instantiating subsets of variables.
This document discusses reducibility and the halting problem. It introduces reducibility as a way to convert one problem into another problem such that solving the second problem solves the first. The document then discusses the halting problem (HALTTM) in detail, proving it is undecidable through a reduction from the acceptance problem (ATM). It introduces computation histories as a method to prove reductions and discusses their use in showing languages like ALBA, ELBA, and ALLCFG are decidable/undecidable.
This document discusses undecidability and Turing recognizability. It begins by introducing the acceptability problem (ATM) and uses diagonalization to prove it is undecidable. It shows that while ATM is Turing recognizable, its complement is not, meaning ATM cannot be decided. It then proves that the set of Turing recognizable languages is countable but the set of all languages is uncountable.
This document summarizes key concepts from a lecture on decidability in formal language theory:
- Context-free languages (CFLs) are decidable as their acceptability can be determined by a Turing machine that simulates a pushdown automaton.
- The acceptability problem for context-free grammars (ACFG) - determining if a string is in the language of a given CFG - is decidable using a algorithm that lists all derivations.
- This shows that the class of languages recognized by Turing machines is decidable.
- However, diagonalization arguments show that some problems are undecidable, such as the halting problem of determining if an arbitrary Turing machine
1) Reducibility involves converting one problem into another related problem such that solving the second problem provides a means to solve the first problem.
2) Reducibility is used to prove that certain problems are computationally unsolvable by reducing them to known undecidable problems.
3) Examples of reduction are provided, including reducing the halting problem (ATM) to the emptiness problem (ETM), and using this to prove ETM is undecidable.
The document discusses the limits of computation and reducibility. It covers three key points:
1. It introduces different classes of languages based on whether they are decidable, recognizable, co-decidable, etc. and provides examples like EMPTY, ACCEPT, and ACCEPT_ε.
2. It explains the concept of reducibility and how solving one problem can be reduced to solving another. This is shown using examples like the halting problem and emptiness testing.
3. It proves several important theorems like Rice's Theorem, which states that any non-trivial property of Turing machine languages is undecidable. The halting problem and computation histories are also revisited.
This document provides an introduction and overview of a research paper on network synthesis for non-simultaneous requirements. It begins with an abstract describing how the paper will provide an introduction to matroid theory and the greedy algorithm to form the basis for an initial optimal network synthesis algorithm. It will then expand the algorithm to allow for non-uniform cost functions and explore generalizing the problem to allow for multiple commodity flows. The document provides definitions for key concepts like graphs, networks, requirements graphs, and formulates the network synthesis problem. It introduces matroids and the greedy algorithm, proving their relationship and showing how the greedy algorithm can be used to find optimal solutions for matroid problems. It provides an example matroid and greedy algorithm application.
1. Exact inference in Bayesian networks is NP-hard in the worst case, so approximation techniques are needed for large networks.
2. Major approximation techniques include variational methods like mean-field approximation, sampling methods like Monte Carlo Markov Chain, and bounded cutset conditioning.
3. Variational methods introduce variational parameters to minimize the distance between the approximate and true distributions. Sampling methods draw random samples to estimate probabilities. Bounded cutset conditioning breaks loops by instantiating subsets of variables.
1. Exact inference in Bayesian networks is NP-hard in the worst case, so approximation techniques are needed for large networks.
2. Major approximation techniques include variational methods like mean-field approximation, sampling methods like Monte Carlo Markov Chain, and bounded cutset conditioning.
3. Variational methods introduce variational parameters to minimize the distance between the approximate and true distributions. Sampling methods draw random samples to estimate probabilities. Bounded cutset conditioning breaks loops by instantiating subsets of variables.
This document provides an introduction to computational finance using MATLAB. It discusses MATLAB basics like matrices, vectors, solving linear equations, and generating random numbers. Key points covered include:
- MATLAB is well-suited for numerical linear algebra operations on matrices and vectors.
- Functions like rand and randn are used to generate uniformly distributed and Gaussian/normal distributed random numbers, which are important in finance.
- Histograms can be used to visualize the distributions of random numbers and converge to the probability density function as the number of samples increases.
The document discusses linear programming and the simplex method for solving linear programming problems. It begins with definitions of linear programming and its history. It then provides an example production planning problem that can be formulated as a linear programming problem. The document goes on to describe the standard form of a linear programming problem and terminology used. It explains how the simplex method works through iterative improvements to find the optimal solution. This is illustrated both geometrically and through an algebraic example solved using the simplex method.
The document discusses extending the barrier method to optimization problems with generalized inequalities. It introduces logarithmic barrier functions for generalized inequalities and defines the central path. Points on the central path give dual feasible solutions. The barrier method can be applied to find an epsilon-optimal solution in O(log(1/epsilon)) iterations, each requiring O(sqrt(n)) Newton iterations under self-concordance assumptions. Complexity is analyzed using self-concordant functions and properties of generalized logarithms.
[AAAI2021] Combinatorial Pure Exploration with Full-bandit or Partial Linear ...Yuko Kuroki (黒木祐子)
The document describes a new model called combinatorial pure exploration with partial linear feedback (CPE-PL) for decision making problems with combinatorial actions and limited feedback. CPE-PL generalizes previous models by allowing for nonlinear rewards and more limited feedback through a transformation matrix. The document proposes the first static algorithm for CPE-PL that provides sample complexity guarantees and runs faster than existing approaches. It also introduces a two-phased adaptive algorithm for the special case of CPE-BL with full-bandit linear feedback and proves its sample complexity is optimal up to logarithmic factors.
Utilitas Mathematica Journal has became fully open access Journal. our journal publishes Algebra, Analysis, Geometry, Topology, Number Theory publishes original research papers in this journal.UJM journal mission, Promote the Practice and Profession of Statistics, can be realized only by fully embracing justice, equity, diversity, and inclusivity in all of our operations.
The document presents new determinantal inequalities for positive definite matrices. It uses a concavity approach to prove several subadditive and superadditive inequalities for the determinant function. Specifically, it shows that for positive definite matrices A and B, the determinant of their convex combination is bounded above and below by expressions involving the determinants of A and B. It also derives related inequalities for matrices of the form A + iB, where A and B are positive definite. The concavity approach provides an alternative method for proving some known determinant identities.
https://utilitasmathematica.com/index
Our Journal has a We invite the entire statistical community to join us on this journey towards a more just, equitable, diverse, and inclusive future. By collectively embracing these principles, we can create a statistical landscape that reflects the richness of human experiences and contributes to a more robust and impactful field.
The document presents new determinantal inequalities for positive definite matrices. It uses a concavity approach to prove several subadditive and superadditive inequalities for the determinant function. Specifically, it shows that for positive definite matrices A and B, the determinant of their convex combination is bounded above and below by expressions involving the determinants of A and B. It also derives related inequalities for matrices of the form A + iB, where A and B are positive definite. The concavity approach provides an alternative method for proving some known determinant identities.
https://utilitasmathematica.com/index
Our Journal has taken significant strides towards fostering a professional community that reflects the values of justice, equity, diversity, and inclusion (JEDI). In reaffirming our commitment to the mission of "Promoting the Practice and Profession of Statistics," we recognize that achieving this goal is intricately linked to creating an environment that is just, equitable, diverse, and inclusive.
https://utilitasmathematica.com/index
Our Journal has Journal is steadfast in its commitment to promoting justice, equity, diversity, and inclusion within the realm of statistics. Through collaborative efforts and a collective dedication to these principles, we believe in building a statistical community that not only advances the profession but also reflects the values we hold dear.
https://utilitasmathematica.com/index
Our Journal has is steadfast in its commitment to promoting justice, equity, diversity, and inclusion within the realm of statistics. Through collaborative efforts and a collective dedication to these principles, we believe in building a statistical community that not only advances the profession but also reflects the values we hold dear.
The document discusses approximation algorithms for NP-complete problems. It introduces the concept of approximation ratios, which measure how close an approximate solution from a polynomial-time algorithm is to the optimal solution. The document then provides examples of approximation algorithms with a ratio of 2 for the vertex cover and traveling salesman problems. It also discusses using backtracking to find all possible solutions to the subset sum problem.
This paper presents an algorithm for efficiently updating the display on a video terminal to reflect changes made to text. The algorithm takes descriptions of the current and desired images as input. It uses an algorithm for the string-to-string correction problem to determine the minimum number of character insertions, deletions and transformations needed to transform the current image string into the desired image string. By analyzing the output trace from this algorithm, the display can be updated line-by-line using the basic operations available on most video terminals, such as inserting and deleting characters or lines. This allows the display to be updated optimally with minimal redrawn characters.
This document provides an overview of analog control systems and Laplace transforms. It introduces key concepts like Laplace transforms, common time domain inputs, transfer functions, and modeling electrical, mechanical and electromechanical systems using block diagrams and mathematical models. Examples are provided to illustrate Laplace transforms, transfer functions, and analyzing system response using poles, zeros and stability analysis.
This document provides an overview of analog control systems and Laplace transforms. It introduces key concepts like Laplace transforms, common time domain inputs, transfer functions, and modeling electrical, mechanical and electromechanical systems using block diagrams and mathematical models. Examples are provided to illustrate Laplace transforms, transfer functions, and analyzing system response using poles, zeros and stability analysis.
The document discusses numerical methods for solving linear systems of equations. It begins by classifying methods as either direct or iterative. Direct methods include Gaussian elimination and LU decomposition, which can solve systems exactly in a finite number of steps absent rounding errors. The document then discusses special matrices like symmetric positive definite matrices, which can be solved more efficiently using techniques like Cholesky decomposition. It also covers reordering strategies to reduce computational costs. The document concludes by discussing how to bound the error in solutions using quantities like the condition number and residual.
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchingssagark4
This document summarizes a research paper about maximizing a nonnegative, monotone, submodular function subject to matching constraints. It shows that this constrained submodular maximization matching (CSM-Matching) problem is NP-hard by reducing the maximum k-cover problem to it. It then presents a 3-approximation greedy algorithm for CSM-Matching. It further reduces CSM-Matching to the problem of maximizing a submodular function over two matroids, for which there is a (2+ε)-approximation algorithm called LSV2. Using LSV2 as a black box, the document shows how to find a (4+ε)-approximate solution to CSM-
This document describes an integer difference logic (IDL) theory solver that is tightly integrated with a SAT solver. It presents the lazy approach of having the SAT solver enumerate Boolean models and having the theory solver check their consistency in the theory. For IDL, it translates constraints into a graph and checks for negative cycles to determine satisfiability. It uses the Bellman-Ford algorithm to compute shortest paths and find a model if no negative cycles exist. The solver aims to reason incrementally, return minimal conflicts, and perform theory propagation for efficiency.
This document provides an overview of support vector machines (SVMs). It discusses how SVMs can be used to perform classification tasks by finding optimal separating hyperplanes that maximize the margin between different classes. The document outlines how SVMs solve an optimization problem to find these optimal hyperplanes using techniques like Lagrange duality, kernels, and soft margins. It also covers model selection methods like cross-validation and discusses extensions of SVMs to multi-class classification problems.
Aggression - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
More Related Content
Similar to Winter 12 Lecture Mapping Reducibility.pptx
This document provides an introduction to computational finance using MATLAB. It discusses MATLAB basics like matrices, vectors, solving linear equations, and generating random numbers. Key points covered include:
- MATLAB is well-suited for numerical linear algebra operations on matrices and vectors.
- Functions like rand and randn are used to generate uniformly distributed and Gaussian/normal distributed random numbers, which are important in finance.
- Histograms can be used to visualize the distributions of random numbers and converge to the probability density function as the number of samples increases.
The document discusses linear programming and the simplex method for solving linear programming problems. It begins with definitions of linear programming and its history. It then provides an example production planning problem that can be formulated as a linear programming problem. The document goes on to describe the standard form of a linear programming problem and terminology used. It explains how the simplex method works through iterative improvements to find the optimal solution. This is illustrated both geometrically and through an algebraic example solved using the simplex method.
The document discusses extending the barrier method to optimization problems with generalized inequalities. It introduces logarithmic barrier functions for generalized inequalities and defines the central path. Points on the central path give dual feasible solutions. The barrier method can be applied to find an epsilon-optimal solution in O(log(1/epsilon)) iterations, each requiring O(sqrt(n)) Newton iterations under self-concordance assumptions. Complexity is analyzed using self-concordant functions and properties of generalized logarithms.
[AAAI2021] Combinatorial Pure Exploration with Full-bandit or Partial Linear ...Yuko Kuroki (黒木祐子)
The document describes a new model called combinatorial pure exploration with partial linear feedback (CPE-PL) for decision making problems with combinatorial actions and limited feedback. CPE-PL generalizes previous models by allowing for nonlinear rewards and more limited feedback through a transformation matrix. The document proposes the first static algorithm for CPE-PL that provides sample complexity guarantees and runs faster than existing approaches. It also introduces a two-phased adaptive algorithm for the special case of CPE-BL with full-bandit linear feedback and proves its sample complexity is optimal up to logarithmic factors.
Utilitas Mathematica Journal has became fully open access Journal. our journal publishes Algebra, Analysis, Geometry, Topology, Number Theory publishes original research papers in this journal.UJM journal mission, Promote the Practice and Profession of Statistics, can be realized only by fully embracing justice, equity, diversity, and inclusivity in all of our operations.
The document presents new determinantal inequalities for positive definite matrices. It uses a concavity approach to prove several subadditive and superadditive inequalities for the determinant function. Specifically, it shows that for positive definite matrices A and B, the determinant of their convex combination is bounded above and below by expressions involving the determinants of A and B. It also derives related inequalities for matrices of the form A + iB, where A and B are positive definite. The concavity approach provides an alternative method for proving some known determinant identities.
https://utilitasmathematica.com/index
Our Journal has a We invite the entire statistical community to join us on this journey towards a more just, equitable, diverse, and inclusive future. By collectively embracing these principles, we can create a statistical landscape that reflects the richness of human experiences and contributes to a more robust and impactful field.
The document presents new determinantal inequalities for positive definite matrices. It uses a concavity approach to prove several subadditive and superadditive inequalities for the determinant function. Specifically, it shows that for positive definite matrices A and B, the determinant of their convex combination is bounded above and below by expressions involving the determinants of A and B. It also derives related inequalities for matrices of the form A + iB, where A and B are positive definite. The concavity approach provides an alternative method for proving some known determinant identities.
https://utilitasmathematica.com/index
Our Journal has taken significant strides towards fostering a professional community that reflects the values of justice, equity, diversity, and inclusion (JEDI). In reaffirming our commitment to the mission of "Promoting the Practice and Profession of Statistics," we recognize that achieving this goal is intricately linked to creating an environment that is just, equitable, diverse, and inclusive.
https://utilitasmathematica.com/index
Our Journal has Journal is steadfast in its commitment to promoting justice, equity, diversity, and inclusion within the realm of statistics. Through collaborative efforts and a collective dedication to these principles, we believe in building a statistical community that not only advances the profession but also reflects the values we hold dear.
https://utilitasmathematica.com/index
Our Journal has is steadfast in its commitment to promoting justice, equity, diversity, and inclusion within the realm of statistics. Through collaborative efforts and a collective dedication to these principles, we believe in building a statistical community that not only advances the profession but also reflects the values we hold dear.
The document discusses approximation algorithms for NP-complete problems. It introduces the concept of approximation ratios, which measure how close an approximate solution from a polynomial-time algorithm is to the optimal solution. The document then provides examples of approximation algorithms with a ratio of 2 for the vertex cover and traveling salesman problems. It also discusses using backtracking to find all possible solutions to the subset sum problem.
This paper presents an algorithm for efficiently updating the display on a video terminal to reflect changes made to text. The algorithm takes descriptions of the current and desired images as input. It uses an algorithm for the string-to-string correction problem to determine the minimum number of character insertions, deletions and transformations needed to transform the current image string into the desired image string. By analyzing the output trace from this algorithm, the display can be updated line-by-line using the basic operations available on most video terminals, such as inserting and deleting characters or lines. This allows the display to be updated optimally with minimal redrawn characters.
This document provides an overview of analog control systems and Laplace transforms. It introduces key concepts like Laplace transforms, common time domain inputs, transfer functions, and modeling electrical, mechanical and electromechanical systems using block diagrams and mathematical models. Examples are provided to illustrate Laplace transforms, transfer functions, and analyzing system response using poles, zeros and stability analysis.
This document provides an overview of analog control systems and Laplace transforms. It introduces key concepts like Laplace transforms, common time domain inputs, transfer functions, and modeling electrical, mechanical and electromechanical systems using block diagrams and mathematical models. Examples are provided to illustrate Laplace transforms, transfer functions, and analyzing system response using poles, zeros and stability analysis.
The document discusses numerical methods for solving linear systems of equations. It begins by classifying methods as either direct or iterative. Direct methods include Gaussian elimination and LU decomposition, which can solve systems exactly in a finite number of steps absent rounding errors. The document then discusses special matrices like symmetric positive definite matrices, which can be solved more efficiently using techniques like Cholesky decomposition. It also covers reordering strategies to reduce computational costs. The document concludes by discussing how to bound the error in solutions using quantities like the condition number and residual.
Maximizing a Nonnegative, Monotone, Submodular Function Constrained to Matchingssagark4
This document summarizes a research paper about maximizing a nonnegative, monotone, submodular function subject to matching constraints. It shows that this constrained submodular maximization matching (CSM-Matching) problem is NP-hard by reducing the maximum k-cover problem to it. It then presents a 3-approximation greedy algorithm for CSM-Matching. It further reduces CSM-Matching to the problem of maximizing a submodular function over two matroids, for which there is a (2+ε)-approximation algorithm called LSV2. Using LSV2 as a black box, the document shows how to find a (4+ε)-approximate solution to CSM-
This document describes an integer difference logic (IDL) theory solver that is tightly integrated with a SAT solver. It presents the lazy approach of having the SAT solver enumerate Boolean models and having the theory solver check their consistency in the theory. For IDL, it translates constraints into a graph and checks for negative cycles to determine satisfiability. It uses the Bellman-Ford algorithm to compute shortest paths and find a model if no negative cycles exist. The solver aims to reason incrementally, return minimal conflicts, and perform theory propagation for efficiency.
This document provides an overview of support vector machines (SVMs). It discusses how SVMs can be used to perform classification tasks by finding optimal separating hyperplanes that maximize the margin between different classes. The document outlines how SVMs solve an optimization problem to find these optimal hyperplanes using techniques like Lagrange duality, kernels, and soft margins. It also covers model selection methods like cross-validation and discusses extensions of SVMs to multi-class classification problems.
Similar to Winter 12 Lecture Mapping Reducibility.pptx (20)
Aggression - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Stealth attraction for mens gets her with your wordsichettrisagar95
My article gives a set of techniques used by men to subtly and effectively attract women without overtly displaying their intentions. It involves using non-verbal cues, body language, and subtle psychological tactics to create intrigue and build attraction. The goal is to appear confident, mysterious, and charismatic while maintaining an air of mystery that piques the interest of the person you are trying to attract. This approach emphasizes subtlety and finesse in communication and interaction to create a powerful and lasting impression.
This presentation delves into the core principles of personality development as taught by Tim Han. Understand the importance of self-awareness, goal setting, and maintaining a positive attitude. Gain valuable tips on improving communication skills and developing emotional intelligence. Tim Han’s practical advice and holistic approach will help you embark on a transformative journey towards becoming your best self.
Covey says most people look for quick fixes. They see a big success and want to know how he did it, believing (and hoping) they can do the same following a quick bullet list.
But real change, the author says, comes not from the outside in, but from the inside out. And the most fundamental way of changing yourself is through a paradigm shift.
That paradigm shift is a new way of looking at the world. The 7 Habits of Highly Effective People presents an approach to effectiveness based on character and principles.
The first three habits indeed deal with yourself because it all starts with you. The first three habits move you from dependence from the world to the independence of making your own world.
Habits 4, 5 and 6 are about people and relationships. The will move you from independence to interdependence. Such, cooperating to achieve more than you could have by yourself.
The last habit, habit number 7, focuses on continuous growth and improvement.
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
2. Reduction via computation histories
EECS 2001 Introduction to Theory of Computation 2
Post correspondence problem
Suppose we have two sets of strings over the alphabet {a,b}.
Suppose we make a longer string by concatenating members of the first set (repetition is
allowed)
Suppose we make another longer string by concatenating members of the second set (repetition
is allowed)
Is it possible to make the above two longer strings identical using the members of the sets
provided to us – is it decidable?
3. Reduction via computation histories
EECS 2001 Introduction to Theory of Computation 3
Post correspondence problem
Suppose Set 1 = {bb, ab, c}
Suppose Set 2 = {b, ba, bc}
The longer string from Set 1 = bbababababababc (we repeated the second string from set 1)
The longer string from Set 2 = bbababababababc (we repeated the second string from set 2)
Is this possible for all sets?
4. Reduction via computation histories
EECS 2001 Introduction to Theory of Computation 4
Post correspondence problem
Suppose Set 3 = {a, ab, bba}
Suppose Set 4 = {baa, aa, bb}
The longer string from Set 3 = bbaabbbaa
The longer string from Set 4 = bbaabbbaa
Is this possible for all sets?
5. Reduction via computation histories
EECS 2001 Introduction to Theory of Computation 5
Post correspondence problem
PCP = {⟨P⟩| P is an instance of the Post Correspondence Problem with a match}
Overview of the proof
The strings will be accepted by the TM if there is a computation history. If there is no computation
history, the TM can say reject. This is the functionality we need for deciding ATM. Contradiction.
Hence PCP is undecidable.
Detailed proof in the book. Read – not in the exam.
6. Reducibility
EECS 2001 Introduction to Theory of Computation 6
Until now, we have been using reducibility to prove whether a
language is decidable or not
Can we use reducibility to check a language for Turing-
recognizability?
7. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 7
Mapping reducibility (not a new concept – just formalizing
what we have already discussed)
If we can reduce problem A to B by using mapping reducibility, then
this means that there is a computable function which converts
instances of A into instances of B
There are other ways to formally define reducing one problem
to another
Mapping reducibility is just one way to define
Depends on the application of reducibility
8. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 8
Mapping reducibility (not a new concept – just formalizing
what we have already discussed)
If we can reduce problem A to B by using mapping reducibility, then
this means that there is a computable function which converts
instances of A to instances of B
Such a function is called a reduction
We can solve A with a solver for B
9. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 9
Computable function
A TM computes a function by starting with the input to the function and
stopping (halts) when the output of the function is on the tape
Formally, f: Σ*Σ*, where f is a computable function if there is a TM M
such that for every input w, M halts with only f(w) on the tape
10. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 10
Computable function example
Arithmetic operation on integers are computable functions
Think of a TM which takes as input one or more integers (m1,
m2, m3, m4, …) and returns
m1+m2+…,
m1-m2,
m1/m2,
m1*m2,
- m1
11. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 11
More complex computable function example
Takes a description of a TM as a string, and converts it into another
TM (output is the description of the new TM)
e.g.,
one which does not attempt to move left of the leftmost cell,
one that does not use any symbol to mark the start of the tape,
…
12. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 12
Formal definition
Language A is mapping reducible to Language B (A ≤m B), if there is a
computable function f: Σ*Σ*, where
w A f(w) B
13. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 13
Theorem 5.22
If A ≤m B and B is decidable, then A is decidable
Proof
Let M be the decider for B
Let f be the reduction from A to B
N (a decider for A) is described as
When w is received as input
Compute f(w)
Run M on f(w) and let N output whatever M outputs
In essence, If f(w) belongs to B, then w belongs to A
14. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 14
Previously, we have been using the following
Corollary 5.23
If A ≤m B and A is undecidable, then B is undecidable
Using the proven undecidability of something (ATM) to decide the
undecidability of some other problems
As compared to
Theorem 5.22 (previous slide)
If A ≤m B and B is decidable, then A is decidable
Using the proven decidability of something to decide the decidability of
some other problems
Note: the results will not change
15. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 15
Revisiting HALTTM
Previously: a decider for HALTTM was used to decide ATM, and we
ended up with a contradiction
Mapping reducibility from ATM to HALTTM
Computable function:
Input ⟨M, w⟩, Output ⟨M’, w’⟩
⟨M, w⟩ ∈ ATM if and only if ⟨M′, w′⟩ ∈ HALTTM.
Why is that?
Answer: if the HALT machine stops on the complement of the input then
only our input will be accepted by ATM
Remember: complement of something decidable should be recognizable
otherwise the original will not be decidable (HALT is a recognizer)
16. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 16
Revisiting HALTTM
Previously: a decider for HALTTM was used to decide ATM, and we
ended up with a contradiction
Mapping reducibility from ATM to HALTTM
Let F be a TM which computes the reduction f as follows
On input ⟨M, w⟩
F Constructs M’ which works as follows (on input x)
Run M on x (any string)
If M accepts, M’ accepts. If M rejects, M’ enters a loop.
Let D be the decider for HALT
Run D on ⟨M’, w⟩ as follows
If D accepts ⟨M’, w⟩ then F accepts ⟨M, w⟩
If D rejects ⟨M’, w⟩ then F rejects ⟨M, w⟩
17. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 17
Theorem 5.28
If A ≤m B and B is Turing-recognizable, then A is Turing-recognizable
Proof (similar to 5.22)
Let M be the Turing-recognizer for B
Let f be the reduction from A to B
N (a Turing-recognizer for A) is described as
When w is received as input
Compute f(w)
Run M on f(w) and output whenever M outputs
18. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 18
Corollary 5.29
If A ≤m B and A is not Turing-recognizable, then B is not
Turing-recognizable.
19. Mapping Reducibility
EECS 2001 Introduction to Theory of Computation 19
Corollary 4.23
ATM’ is not Turing recognizable
ATM is Turing recognizable
If ATM’ was also Turing recognizable, then ATM would be decidable
Since we have already proved that ATM is not decidable (Theorem 4.11), ATM’
must not be Turing-recognizable
20. EQTM is neither T-recognizable nor co-T-recognizable
EECS 2001 Introduction to Theory of Computation 20
Step 1: EQTM is not T-recognizable
Reducing ATM to EQTM’
Reducing function f
TM F takes (M, w) as input
1. Construct M1 and M2
M1 rejects on all inputs
M2 runs M on all inputs (w)
If M accepts w, then M2 accepts
2. Output (M1, M2)
The above steps mean that M1 accepts nothing and M2 accepts everything
(provided M accepts w). Hence the machines are not equivalent
Conversely, if M does not accept w, then M2 accepts nothing and they are
equivalent
Hence f reduces ATM to EQTM
21. EQTM is neither T-recognizable nor co-T-recognizable
EECS 2001 Introduction to Theory of Computation 21
Step 2: EQTM’ is not T-recognizable
Reducing ATM to EQTM (complement of EQTM’)
Showing ATM ≤m EQTM
Let the reducing function be g
TM G takes (M, w) as input
1. Construct M1 and M2
M1 Accept on all inputs
M2 run M on all inputs
If M accepts, then accept
2. Output (M1, M2)
The above steps mean that M1 accepts everything and M2 accepts
everything (provided M accepts w)
22. EQTM is neither T-recognizable nor co-T-recognizable
EECS 2001 Introduction to Theory of Computation 22
Difference between f and g
f
M1 always rejects
M accepts w iff M1 and M2 are equivalent
g
M1 always accepts
f and g
M accepts iff M2 always accepts
23. References
EECS 2001 Introduction to Theory of Computation 23
Ideas, problems and their solutions in this lecture/tutorial have been taken from
• Prof. Jeffery Edmonds’ Lecture notes for EECS 2001 at York University
• Prof. Suprakash Datta’ Lecture notes for EECS 2001 at York University
• Introduction to the Theory of Computation (3rd edition) by Michael Sipser
• Introduction to Theory of Computation by Anil Maheshwari and Michiel Smid
• Wikipedia and other webpages of different professors/universities