We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 54 results
  1. Deeper Computability

    In this Chapter, we will develop a number of more advanced tools we can use to tackle issues in computability theory. In particular, we will be able...
    Chapter 2024
  2. A Tree of Guesses (Weak Thickness Lemma)

    The priority tree, which we call a “tree of guesses,” is introduced, and used for a construction involving infinite injury. The associated concept of...
    Chapter 2023
  3. Priorities (A Splitting Theorem)

    A simple priority argument is motivated and presented.
    Chapter 2023
  4. Notation and Terms

    An index of notation and terms is given, along with general comments about the notation and the pseudo-code used in this book.
    Chapter 2023
  5. Induction and bounding

    The most common kind of reverse mathematics result shows that a given problem requires a particular set existence axiom to solve. Accordingly, we...
    Damir D. Dzhafarov, Carl Mummert in Reverse Mathematics
    Chapter 2022
  6. Witness Lists (Density Theorem)

    The algorithm in this chapter uses and extends many of the techniques that we have seen so far. Also, it introduces a few more, such as “coding,”...
    Chapter 2023
  7. The propositional normal default logic and the finite/infinite injury priority method

    In propositional normal default logic, given a default theory (Δ, D ) and a well-defined ordering of D , there is a method to construct an extension of...

    Wei Li, Yuefei Sui, Yuhui Wang in Science China Information Sciences
    Article 27 April 2017
  8. Computability of Real Numbers

    In scientific computation and engineering real numbers are typically approximated by rational numbers which approximate, in principle, the real...
    Robert Rettinger, **zhong Zheng in Handbook of Computability and Complexity in Analysis
    Chapter 2021
  9. Ramsey’s theorem

    Ramsey proved his eponymous theorem in his 1929 paper “On a problem of formal logic” [253]. The focus was actually not on combinatorics at all, but...
    Damir D. Dzhafarov, Carl Mummert in Reverse Mathematics
    Chapter 2022
  10. Other combinatorial principles

    Seetapun’s theorem (Theorem 8.3.1) and the follow-up work of Cholak, Jockusch, and Slaman [33] led to the realization that not only are there natural...
    Damir D. Dzhafarov, Carl Mummert in Reverse Mathematics
    Chapter 2022
  11. Semilattices of Punctual Numberings

    The theory of numberings studies uniform computations for classes of mathematical objects. A large body of literature is devoted to investigations of...
    Nikolay Bazhenov, Manat Mustafa, Sergei Ospichev in Theory and Applications of Models of Computation
    Conference paper 2020
  12. Computable Measure Theory and Algorithmic Randomness

    We provide a survey of recent results in computable measure and probability theory, from the perspectives of both computable analysis and algorithmic...
    Chapter 2021
  13. Prolepsis

    Learning something is not a trivial act – the ancient Greeks were quite aware of the difficulties attendant to the creation of something from...
    András Kornai in Semantics
    Chapter 2020
  14. The Finite Injury Method

    A positive solution to Post’s problem was finally achieved by Friedberg in [Friedberg 1957] and independently by Muchnik in [Muchnik 1956], who built...
    Robert I. Soare in Turing Computability
    Chapter 2016
  15. Genericity of Weakly Computable Objects

    In computability theory many results state the existence of objects that in many respects lack algorithmic structure but at the same time are...

    Mathieu Hoyrup in Theory of Computing Systems
    Article 09 December 2016
  16. Strength and Weakness in Computable Structure Theory

    We survey the current results about degrees of categoricity and the degrees that are low for isomorphism as well as the proof techniques used in the...
    Johanna N. Y. Franklin in Computability and Complexity
    Chapter 2017
  17. More Lachlan Games

    With the Kleene-Post [1954] paper on oracle constructions presented in Chapter 6 , and the...
    Robert I. Soare in Turing Computability
    Chapter 2016
  18. There Are No Maximal d.c.e. wtt-degrees

    In this article, we will study the weak-truth-table (wtt, for short) degrees of d.c.e. sets and show that there is no maximal d.c.e. wtt-degree.
    Guohua Wu, Mars M. Yamaleev in Computability and Complexity
    Chapter 2017
  19. Detecting requirements defects with NLP patterns: an industrial experience in the railway domain

    In the railway safety-critical domain requirements documents have to abide to strict quality criteria. Rule-based natural language processing (NLP)...

    Alessio Ferrari, Gloria Gori, ... Stefania Gnesi in Empirical Software Engineering
    Article 20 February 2018
  20. Nondensity of Double Bubbles in the D.C.E. Degrees

    In this paper, we show that the so-called “double bubbles” are not downward dense in the d.c.e. degrees. Here, a pair of d.c.e. degrees...
    Uri Andrews, Rutger Kuyper, ... Mars M. Yamaleev in Computability and Complexity
    Chapter 2017
Did you find what you were looking for? Share feedback.