SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
Not Every Domain of a Plain Decompressor
Contains the Domain of a Prefix-Free One

Mikhail Andreev, Ilya Razenshteyn and Alexander Shen


                   July 23, 2010
Kolmogorov complexity
Kolmogorov complexity




      A measure of information in a given string.
Kolmogorov complexity




      A measure of information in a given string.
      One can easily define a set of Martin-L¨f random
                                               o
      sequences (the algorithmic law of large numbers, the
      algorithmic law of iterated logarithm, etc).
Kolmogorov complexity




      A measure of information in a given string.
      One can easily define a set of Martin-L¨f random
                                               o
      sequences (the algorithmic law of large numbers, the
      algorithmic law of iterated logarithm, etc).
      Analysis of running time of algorithms (Moser-Tardos,
      constructive LLL).
Kolmogorov complexity




      A measure of information in a given string.
      One can easily define a set of Martin-L¨f random
                                               o
      sequences (the algorithmic law of large numbers, the
      algorithmic law of iterated logarithm, etc).
      Analysis of running time of algorithms (Moser-Tardos,
      constructive LLL).
      And so on...
Decompressors
Decompressors

      A decompressor is a computable partial function
      D : {0, 1}∗ → {0, 1}∗ .
Decompressors

      A decompressor is a computable partial function
      D : {0, 1}∗ → {0, 1}∗ .
      Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect
      to a decompressor D: CD (x) := min{|y | | D(y ) = x}.
Decompressors

      A decompressor is a computable partial function
      D : {0, 1}∗ → {0, 1}∗ .
      Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect
      to a decompressor D: CD (x) := min{|y | | D(y ) = x}.
      There exists an optimal decompressor U such that CU is
      minimal up to O(1). C (x) := CU (x) is a plain complexity of
      x.
Decompressors

      A decompressor is a computable partial function
      D : {0, 1}∗ → {0, 1}∗ .
      Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect
      to a decompressor D: CD (x) := min{|y | | D(y ) = x}.
      There exists an optimal decompressor U such that CU is
      minimal up to O(1). C (x) := CU (x) is a plain complexity of
      x.
      A decompressor is called prefix-free if its domain is
      prefix-free.
Decompressors

      A decompressor is a computable partial function
      D : {0, 1}∗ → {0, 1}∗ .
      Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect
      to a decompressor D: CD (x) := min{|y | | D(y ) = x}.
      There exists an optimal decompressor U such that CU is
      minimal up to O(1). C (x) := CU (x) is a plain complexity of
      x.
      A decompressor is called prefix-free if its domain is
      prefix-free.
      There exists an optimal prefix-free decompressor V .
      K (x) := CV (x) is a prefix complexity of x.
Decompressors

      A decompressor is a computable partial function
      D : {0, 1}∗ → {0, 1}∗ .
      Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect
      to a decompressor D: CD (x) := min{|y | | D(y ) = x}.
      There exists an optimal decompressor U such that CU is
      minimal up to O(1). C (x) := CU (x) is a plain complexity of
      x.
      A decompressor is called prefix-free if its domain is
      prefix-free.
      There exists an optimal prefix-free decompressor V .
      K (x) := CV (x) is a prefix complexity of x.
      The difference K (x) − C (x) can be as large as log |x|.
The main question
The main question

      In DLT 2008 paper Calude, Nies, Staiger and Stephan
      characterized (supersets of) domains of optimal (prefix-free)
      decompressors.
The main question

      In DLT 2008 paper Calude, Nies, Staiger and Stephan
      characterized (supersets of) domains of optimal (prefix-free)
      decompressors.
      One of their results: a recursively enumerable set W is a
      superset of the domain of an optimal decompressor iff there is
      a constant c such that
      |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n.
The main question

      In DLT 2008 paper Calude, Nies, Staiger and Stephan
      characterized (supersets of) domains of optimal (prefix-free)
      decompressors.
      One of their results: a recursively enumerable set W is a
      superset of the domain of an optimal decompressor iff there is
      a constant c such that
      |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n.
      The main question: does the domain of every optimal
      decompressor contain the domain of some optimal
      prefix-free decompressor?
The main question

      In DLT 2008 paper Calude, Nies, Staiger and Stephan
      characterized (supersets of) domains of optimal (prefix-free)
      decompressors.
      One of their results: a recursively enumerable set W is a
      superset of the domain of an optimal decompressor iff there is
      a constant c such that
      |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n.
      The main question: does the domain of every optimal
      decompressor contain the domain of some optimal
      prefix-free decompressor?
      We show that the answer is ’NO’.
The main question

      In DLT 2008 paper Calude, Nies, Staiger and Stephan
      characterized (supersets of) domains of optimal (prefix-free)
      decompressors.
      One of their results: a recursively enumerable set W is a
      superset of the domain of an optimal decompressor iff there is
      a constant c such that
      |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n.
      The main question: does the domain of every optimal
      decompressor contain the domain of some optimal
      prefix-free decompressor?
      We show that the answer is ’NO’.
      We build an optimal decompressor U such that for every
      optimal prefix-free decompressor V holds dom V ⊆ dom U.
The construction
The construction
      We show that there exists a set A such that:
        1. A contains the domain of one specific optimal decompressor,
        2. A does not contain the domain of any optimal prefix free
           decompressor.
The construction
      We show that there exists a set A such that:
        1. A contains the domain of one specific optimal decompressor,
        2. A does not contain the domain of any optimal prefix free
           decompressor.
      The first part is easy. It is sufficient to require from A the
      following two properties:
        1. A is recursive,
        2. A is sufficiently dense.
The construction
      We show that there exists a set A such that:
        1. A contains the domain of one specific optimal decompressor,
        2. A does not contain the domain of any optimal prefix free
           decompressor.
      The first part is easy. It is sufficient to require from A the
      following two properties:
        1. A is recursive,
        2. A is sufficiently dense.
      By sufficiently dense we mean that for every n
      |A ∩ {0, 1}n | ≥ ε · 2n .
The construction
      We show that there exists a set A such that:
        1. A contains the domain of one specific optimal decompressor,
        2. A does not contain the domain of any optimal prefix free
           decompressor.
      The first part is easy. It is sufficient to require from A the
      following two properties:
        1. A is recursive,
        2. A is sufficiently dense.
      By sufficiently dense we mean that for every n
      |A ∩ {0, 1}n | ≥ ε · 2n .
      An easy case of a result from [CNSS]. Consider an arbitrary
      optimal decompressor D. A is recursive, so there exists a
      computable injective mapping i : {0, 1}∗ → {0, 1}∗ such that:
        1. i(x) ∈ A for every x,
        2. |i(x)| ≤ |x| + c, where c is a fixed constant (one can actually
           take c := log 1/ε ).
The construction
      We show that there exists a set A such that:
        1. A contains the domain of one specific optimal decompressor,
        2. A does not contain the domain of any optimal prefix free
           decompressor.
      The first part is easy. It is sufficient to require from A the
      following two properties:
        1. A is recursive,
        2. A is sufficiently dense.
      By sufficiently dense we mean that for every n
      |A ∩ {0, 1}n | ≥ ε · 2n .
      An easy case of a result from [CNSS]. Consider an arbitrary
      optimal decompressor D. A is recursive, so there exists a
      computable injective mapping i : {0, 1}∗ → {0, 1}∗ such that:
        1. i(x) ∈ A for every x,
        2. |i(x)| ≤ |x| + c, where c is a fixed constant (one can actually
           take c := log 1/ε ).
      D1 (i(x)) := D(x).
The construction
The construction
      It remains to build a recursive set A with the following
      properties:
        1. A is sufficiently dense,
        2. A does not contain the domain of any optimal prefix-free
           decompressor.
The construction
      It remains to build a recursive set A with the following
      properties:
        1. A is sufficiently dense,
        2. A does not contain the domain of any optimal prefix-free
           decompressor.
      A will be, in some sense, a universal set. For every n consider
      strings of length n in the set A. They determine some subset
      in Cantor space, which is open-closed.
      What is needed for A: every open-closed subset of Cantor
      space of measure at least 1/3 is represented at some level and
      even at many subsequent levels
The construction
      It remains to build a recursive set A with the following
      properties:
        1. A is sufficiently dense,
        2. A does not contain the domain of any optimal prefix-free
           decompressor.
      A will be, in some sense, a universal set. For every n consider
      strings of length n in the set A. They determine some subset
      in Cantor space, which is open-closed.
      What is needed for A: every open-closed subset of Cantor
      space of measure at least 1/3 is represented at some level and
      even at many subsequent levels
      Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω
The construction
      It remains to build a recursive set A with the following
      properties:
        1. A is sufficiently dense,
        2. A does not contain the domain of any optimal prefix-free
           decompressor.
      A will be, in some sense, a universal set. For every n consider
      strings of length n in the set A. They determine some subset
      in Cantor space, which is open-closed.
      What is needed for A: every open-closed subset of Cantor
      space of measure at least 1/3 is represented at some level and
      even at many subsequent levels
      Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω
      Ωx = {α ∈ {0, 1}ω | α begins with x}
The construction
      It remains to build a recursive set A with the following
      properties:
        1. A is sufficiently dense,
        2. A does not contain the domain of any optimal prefix-free
           decompressor.
      A will be, in some sense, a universal set. For every n consider
      strings of length n in the set A. They determine some subset
      in Cantor space, which is open-closed.
      What is needed for A: every open-closed subset of Cantor
      space of measure at least 1/3 is represented at some level and
      even at many subsequent levels
      Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω
      Ωx = {α ∈ {0, 1}ω | α begins with x}
      P ⊆ {0, 1}ω is basic if P = n Ωxi .
                                      i=1
The construction
      It remains to build a recursive set A with the following
      properties:
        1. A is sufficiently dense,
        2. A does not contain the domain of any optimal prefix-free
           decompressor.
      A will be, in some sense, a universal set. For every n consider
      strings of length n in the set A. They determine some subset
      in Cantor space, which is open-closed.
      What is needed for A: every open-closed subset of Cantor
      space of measure at least 1/3 is represented at some level and
      even at many subsequent levels
      Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω
      Ωx = {α ∈ {0, 1}ω | α begins with x}
      P ⊆ {0, 1}ω is basic if P = n Ωxi .
                                      i=1
      A ⊆ {0, 1}∗ represents P at level n if P = x∈A∩{0,1}n Ωx .
The construction
      It remains to build a recursive set A with the following
      properties:
        1. A is sufficiently dense,
        2. A does not contain the domain of any optimal prefix-free
           decompressor.
      A will be, in some sense, a universal set. For every n consider
      strings of length n in the set A. They determine some subset
      in Cantor space, which is open-closed.
      What is needed for A: every open-closed subset of Cantor
      space of measure at least 1/3 is represented at some level and
      even at many subsequent levels
      Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω
      Ωx = {α ∈ {0, 1}ω | α begins with x}
      P ⊆ {0, 1}ω is basic if P = n Ωxi .
                                      i=1
      A ⊆ {0, 1}∗ represents P at level n if P = x∈A∩{0,1}n Ωx .
      Construction of A: for every basic set P of measure at least
      1/3 there are infinitely many n such that A represents P at
      levels n, n + 1, . . . , 2n.
Two games
Two games



     Lemma: if ni is a computable sequence such that
         −ni ≤ 1, then K (i) ≤ n + O(1).
       i2                       i
Two games



     Lemma: if ni is a computable sequence such that
         −ni ≤ 1, then K (i) ≤ n + O(1).
       i2                       i
     ’Memory allocation’ game:
         Alice: ni such that i 2−ni ≤ 1 (one by one).
         Bob: xi such that |xi | = ni and {xi } is prefix-free set (responds
         on-line).
         Bob wins if he is able to allocate desired strings.
     Theorem: Bob wins.
Two games
Two games


     The modified game:
         Bob: ε > 0.
         Alice: makes at most 2/3 strings of each length forbidden.
         Alice: ni such that i 2−ni ≤ ε (one by one).
         Bob: xi such that |xi | = ni and {xi } is prefix-free set.
         Moreover, xi must not be forbidden (responds on-line).
         Bob wins if he is able to allocate desired strings.
     Theorem: Alice wins.
Two games


     The modified game:
         Bob: ε > 0.
         Alice: makes at most 2/3 strings of each length forbidden.
         Alice: ni such that i 2−ni ≤ ε (one by one).
         Bob: xi such that |xi | = ni and {xi } is prefix-free set.
         Moreover, xi must not be forbidden (responds on-line).
         Bob wins if he is able to allocate desired strings.
     Theorem: Alice wins.
     Technically, we must consider more complicated game,
     because complexity is defined up to a constant.
Two games


     The modified game:
         Bob: ε > 0.
         Alice: makes at most 2/3 strings of each length forbidden.
         Alice: ni such that i 2−ni ≤ ε (one by one).
         Bob: xi such that |xi | = ni and {xi } is prefix-free set.
         Moreover, xi must not be forbidden (responds on-line).
         Bob wins if he is able to allocate desired strings.
     Theorem: Alice wins.
     Technically, we must consider more complicated game,
     because complexity is defined up to a constant.
     The idea of a proof is the following: Alice wins, and her
     winning set is more or less A.
Thank you for your attention.

Contenu connexe

Tendances

snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functionsRebekah Mercer
 
ENBIS 2018 presentation on Deep k-Means
ENBIS 2018 presentation on Deep k-MeansENBIS 2018 presentation on Deep k-Means
ENBIS 2018 presentation on Deep k-Meanstthonet
 
Kernel Lower Bounds
Kernel Lower BoundsKernel Lower Bounds
Kernel Lower BoundsASPAK2014
 
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...Marco Frasca
 
Modeling biased tracers at the field level
Modeling biased tracers at the field levelModeling biased tracers at the field level
Modeling biased tracers at the field levelMarcel Schmittfull
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierRaj Sikarwar
 
04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2MuradAmn
 
Mit2 092 f09_lec23
Mit2 092 f09_lec23Mit2 092 f09_lec23
Mit2 092 f09_lec23Rahman Hakim
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 
Digital Signal Processing[ECEG-3171]-Ch1_L06
Digital Signal Processing[ECEG-3171]-Ch1_L06Digital Signal Processing[ECEG-3171]-Ch1_L06
Digital Signal Processing[ECEG-3171]-Ch1_L06Rediet Moges
 
Heuristics for counterexamples to the Agrawal Conjecture
Heuristics for counterexamples to the Agrawal ConjectureHeuristics for counterexamples to the Agrawal Conjecture
Heuristics for counterexamples to the Agrawal ConjectureAmshuman Hegde
 
Nies cuny describing_finite_groups
Nies cuny describing_finite_groupsNies cuny describing_finite_groups
Nies cuny describing_finite_groupsAndre Nies
 
Grovers Algorithm
Grovers Algorithm Grovers Algorithm
Grovers Algorithm CaseyHaaland
 

Tendances (20)

snarks <3 hash functions
snarks <3 hash functionssnarks <3 hash functions
snarks <3 hash functions
 
Stochastic Processes Assignment Help
Stochastic Processes Assignment HelpStochastic Processes Assignment Help
Stochastic Processes Assignment Help
 
ENBIS 2018 presentation on Deep k-Means
ENBIS 2018 presentation on Deep k-MeansENBIS 2018 presentation on Deep k-Means
ENBIS 2018 presentation on Deep k-Means
 
Adc
AdcAdc
Adc
 
Rdnd2008
Rdnd2008Rdnd2008
Rdnd2008
 
Kernel Lower Bounds
Kernel Lower BoundsKernel Lower Bounds
Kernel Lower Bounds
 
Review
ReviewReview
Review
 
Chris Sherlock's slides
Chris Sherlock's slidesChris Sherlock's slides
Chris Sherlock's slides
 
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
Talk given at the Twelfth Workshop on Non-Perurbative Quantum Chromodynamics ...
 
Machine Learning 1
Machine Learning 1Machine Learning 1
Machine Learning 1
 
Modeling biased tracers at the field level
Modeling biased tracers at the field levelModeling biased tracers at the field level
Modeling biased tracers at the field level
 
Least squares support Vector Machine Classifier
Least squares support Vector Machine ClassifierLeast squares support Vector Machine Classifier
Least squares support Vector Machine Classifier
 
04 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x204 greedyalgorithmsii 2x2
04 greedyalgorithmsii 2x2
 
Mit2 092 f09_lec23
Mit2 092 f09_lec23Mit2 092 f09_lec23
Mit2 092 f09_lec23
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Stochastic Processes Homework Help
Stochastic Processes Homework Help Stochastic Processes Homework Help
Stochastic Processes Homework Help
 
Digital Signal Processing[ECEG-3171]-Ch1_L06
Digital Signal Processing[ECEG-3171]-Ch1_L06Digital Signal Processing[ECEG-3171]-Ch1_L06
Digital Signal Processing[ECEG-3171]-Ch1_L06
 
Heuristics for counterexamples to the Agrawal Conjecture
Heuristics for counterexamples to the Agrawal ConjectureHeuristics for counterexamples to the Agrawal Conjecture
Heuristics for counterexamples to the Agrawal Conjecture
 
Nies cuny describing_finite_groups
Nies cuny describing_finite_groupsNies cuny describing_finite_groups
Nies cuny describing_finite_groups
 
Grovers Algorithm
Grovers Algorithm Grovers Algorithm
Grovers Algorithm
 

Similaire à CiE 2010 talk

17-dynprog2 17-dynprog2 17-dynprog2 17-dynprog2
17-dynprog2 17-dynprog2 17-dynprog2 17-dynprog217-dynprog2 17-dynprog2 17-dynprog2 17-dynprog2
17-dynprog2 17-dynprog2 17-dynprog2 17-dynprog2Shanmuganathan C
 
Random Matrix Theory and Machine Learning - Part 3
Random Matrix Theory and Machine Learning - Part 3Random Matrix Theory and Machine Learning - Part 3
Random Matrix Theory and Machine Learning - Part 3Fabian Pedregosa
 
Some Thoughts on Sampling
Some Thoughts on SamplingSome Thoughts on Sampling
Some Thoughts on SamplingDon Sheehy
 
MASSS_Presentation_20160209
MASSS_Presentation_20160209MASSS_Presentation_20160209
MASSS_Presentation_20160209Yimin Wu
 
Reference classes: a case study with the poweRlaw package
Reference classes: a case study with the poweRlaw packageReference classes: a case study with the poweRlaw package
Reference classes: a case study with the poweRlaw packageColin Gillespie
 
Driven Oscillation
Driven Oscillation Driven Oscillation
Driven Oscillation Shahzu2
 
Radial Basis Function Interpolation
Radial Basis Function InterpolationRadial Basis Function Interpolation
Radial Basis Function InterpolationJesse Bettencourt
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function홍배 김
 
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...Yandex
 
Integral Calculus Anti Derivatives reviewer
Integral Calculus Anti Derivatives reviewerIntegral Calculus Anti Derivatives reviewer
Integral Calculus Anti Derivatives reviewerJoshuaAgcopra
 
AAC ch 3 Advance strategies (Dynamic Programming).pptx
AAC ch 3 Advance strategies (Dynamic Programming).pptxAAC ch 3 Advance strategies (Dynamic Programming).pptx
AAC ch 3 Advance strategies (Dynamic Programming).pptxHarshitSingh334328
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductorswtyru1989
 
SURF 2012 Final Report(1)
SURF 2012 Final Report(1)SURF 2012 Final Report(1)
SURF 2012 Final Report(1)Eric Zhang
 
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesAndrea Tassi
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codeswtyru1989
 
Cheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networksCheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networksSteve Nouri
 

Similaire à CiE 2010 talk (20)

Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
17-dynprog2.ppt
17-dynprog2.ppt17-dynprog2.ppt
17-dynprog2.ppt
 
17-dynprog2 17-dynprog2 17-dynprog2 17-dynprog2
17-dynprog2 17-dynprog2 17-dynprog2 17-dynprog217-dynprog2 17-dynprog2 17-dynprog2 17-dynprog2
17-dynprog2 17-dynprog2 17-dynprog2 17-dynprog2
 
Random Matrix Theory and Machine Learning - Part 3
Random Matrix Theory and Machine Learning - Part 3Random Matrix Theory and Machine Learning - Part 3
Random Matrix Theory and Machine Learning - Part 3
 
Some Thoughts on Sampling
Some Thoughts on SamplingSome Thoughts on Sampling
Some Thoughts on Sampling
 
MASSS_Presentation_20160209
MASSS_Presentation_20160209MASSS_Presentation_20160209
MASSS_Presentation_20160209
 
Reference classes: a case study with the poweRlaw package
Reference classes: a case study with the poweRlaw packageReference classes: a case study with the poweRlaw package
Reference classes: a case study with the poweRlaw package
 
Driven Oscillation
Driven Oscillation Driven Oscillation
Driven Oscillation
 
Radial Basis Function Interpolation
Radial Basis Function InterpolationRadial Basis Function Interpolation
Radial Basis Function Interpolation
 
The world of loss function
The world of loss functionThe world of loss function
The world of loss function
 
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
Subgradient Methods for Huge-Scale Optimization Problems - Юрий Нестеров, Cat...
 
Integral Calculus Anti Derivatives reviewer
Integral Calculus Anti Derivatives reviewerIntegral Calculus Anti Derivatives reviewer
Integral Calculus Anti Derivatives reviewer
 
AAC ch 3 Advance strategies (Dynamic Programming).pptx
AAC ch 3 Advance strategies (Dynamic Programming).pptxAAC ch 3 Advance strategies (Dynamic Programming).pptx
AAC ch 3 Advance strategies (Dynamic Programming).pptx
 
Randomness conductors
Randomness conductorsRandomness conductors
Randomness conductors
 
SURF 2012 Final Report(1)
SURF 2012 Final Report(1)SURF 2012 Final Report(1)
SURF 2012 Final Report(1)
 
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast ServicesTalk on Resource Allocation Strategies for Layered Multimedia Multicast Services
Talk on Resource Allocation Strategies for Layered Multimedia Multicast Services
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Approx
ApproxApprox
Approx
 
Cheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networksCheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networks
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

CiE 2010 talk

  • 1. Not Every Domain of a Plain Decompressor Contains the Domain of a Prefix-Free One Mikhail Andreev, Ilya Razenshteyn and Alexander Shen July 23, 2010
  • 3. Kolmogorov complexity A measure of information in a given string.
  • 4. Kolmogorov complexity A measure of information in a given string. One can easily define a set of Martin-L¨f random o sequences (the algorithmic law of large numbers, the algorithmic law of iterated logarithm, etc).
  • 5. Kolmogorov complexity A measure of information in a given string. One can easily define a set of Martin-L¨f random o sequences (the algorithmic law of large numbers, the algorithmic law of iterated logarithm, etc). Analysis of running time of algorithms (Moser-Tardos, constructive LLL).
  • 6. Kolmogorov complexity A measure of information in a given string. One can easily define a set of Martin-L¨f random o sequences (the algorithmic law of large numbers, the algorithmic law of iterated logarithm, etc). Analysis of running time of algorithms (Moser-Tardos, constructive LLL). And so on...
  • 8. Decompressors A decompressor is a computable partial function D : {0, 1}∗ → {0, 1}∗ .
  • 9. Decompressors A decompressor is a computable partial function D : {0, 1}∗ → {0, 1}∗ . Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect to a decompressor D: CD (x) := min{|y | | D(y ) = x}.
  • 10. Decompressors A decompressor is a computable partial function D : {0, 1}∗ → {0, 1}∗ . Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect to a decompressor D: CD (x) := min{|y | | D(y ) = x}. There exists an optimal decompressor U such that CU is minimal up to O(1). C (x) := CU (x) is a plain complexity of x.
  • 11. Decompressors A decompressor is a computable partial function D : {0, 1}∗ → {0, 1}∗ . Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect to a decompressor D: CD (x) := min{|y | | D(y ) = x}. There exists an optimal decompressor U such that CU is minimal up to O(1). C (x) := CU (x) is a plain complexity of x. A decompressor is called prefix-free if its domain is prefix-free.
  • 12. Decompressors A decompressor is a computable partial function D : {0, 1}∗ → {0, 1}∗ . Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect to a decompressor D: CD (x) := min{|y | | D(y ) = x}. There exists an optimal decompressor U such that CU is minimal up to O(1). C (x) := CU (x) is a plain complexity of x. A decompressor is called prefix-free if its domain is prefix-free. There exists an optimal prefix-free decompressor V . K (x) := CV (x) is a prefix complexity of x.
  • 13. Decompressors A decompressor is a computable partial function D : {0, 1}∗ → {0, 1}∗ . Kolmogorov complexity of a string x ∈ {0, 1}∗ with respect to a decompressor D: CD (x) := min{|y | | D(y ) = x}. There exists an optimal decompressor U such that CU is minimal up to O(1). C (x) := CU (x) is a plain complexity of x. A decompressor is called prefix-free if its domain is prefix-free. There exists an optimal prefix-free decompressor V . K (x) := CV (x) is a prefix complexity of x. The difference K (x) − C (x) can be as large as log |x|.
  • 15. The main question In DLT 2008 paper Calude, Nies, Staiger and Stephan characterized (supersets of) domains of optimal (prefix-free) decompressors.
  • 16. The main question In DLT 2008 paper Calude, Nies, Staiger and Stephan characterized (supersets of) domains of optimal (prefix-free) decompressors. One of their results: a recursively enumerable set W is a superset of the domain of an optimal decompressor iff there is a constant c such that |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n.
  • 17. The main question In DLT 2008 paper Calude, Nies, Staiger and Stephan characterized (supersets of) domains of optimal (prefix-free) decompressors. One of their results: a recursively enumerable set W is a superset of the domain of an optimal decompressor iff there is a constant c such that |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n. The main question: does the domain of every optimal decompressor contain the domain of some optimal prefix-free decompressor?
  • 18. The main question In DLT 2008 paper Calude, Nies, Staiger and Stephan characterized (supersets of) domains of optimal (prefix-free) decompressors. One of their results: a recursively enumerable set W is a superset of the domain of an optimal decompressor iff there is a constant c such that |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n. The main question: does the domain of every optimal decompressor contain the domain of some optimal prefix-free decompressor? We show that the answer is ’NO’.
  • 19. The main question In DLT 2008 paper Calude, Nies, Staiger and Stephan characterized (supersets of) domains of optimal (prefix-free) decompressors. One of their results: a recursively enumerable set W is a superset of the domain of an optimal decompressor iff there is a constant c such that |A ∩ {0, 1}n | + . . . + |A ∩ {0, 1}n+c | ≥ 2n for every n. The main question: does the domain of every optimal decompressor contain the domain of some optimal prefix-free decompressor? We show that the answer is ’NO’. We build an optimal decompressor U such that for every optimal prefix-free decompressor V holds dom V ⊆ dom U.
  • 21. The construction We show that there exists a set A such that: 1. A contains the domain of one specific optimal decompressor, 2. A does not contain the domain of any optimal prefix free decompressor.
  • 22. The construction We show that there exists a set A such that: 1. A contains the domain of one specific optimal decompressor, 2. A does not contain the domain of any optimal prefix free decompressor. The first part is easy. It is sufficient to require from A the following two properties: 1. A is recursive, 2. A is sufficiently dense.
  • 23. The construction We show that there exists a set A such that: 1. A contains the domain of one specific optimal decompressor, 2. A does not contain the domain of any optimal prefix free decompressor. The first part is easy. It is sufficient to require from A the following two properties: 1. A is recursive, 2. A is sufficiently dense. By sufficiently dense we mean that for every n |A ∩ {0, 1}n | ≥ ε · 2n .
  • 24. The construction We show that there exists a set A such that: 1. A contains the domain of one specific optimal decompressor, 2. A does not contain the domain of any optimal prefix free decompressor. The first part is easy. It is sufficient to require from A the following two properties: 1. A is recursive, 2. A is sufficiently dense. By sufficiently dense we mean that for every n |A ∩ {0, 1}n | ≥ ε · 2n . An easy case of a result from [CNSS]. Consider an arbitrary optimal decompressor D. A is recursive, so there exists a computable injective mapping i : {0, 1}∗ → {0, 1}∗ such that: 1. i(x) ∈ A for every x, 2. |i(x)| ≤ |x| + c, where c is a fixed constant (one can actually take c := log 1/ε ).
  • 25. The construction We show that there exists a set A such that: 1. A contains the domain of one specific optimal decompressor, 2. A does not contain the domain of any optimal prefix free decompressor. The first part is easy. It is sufficient to require from A the following two properties: 1. A is recursive, 2. A is sufficiently dense. By sufficiently dense we mean that for every n |A ∩ {0, 1}n | ≥ ε · 2n . An easy case of a result from [CNSS]. Consider an arbitrary optimal decompressor D. A is recursive, so there exists a computable injective mapping i : {0, 1}∗ → {0, 1}∗ such that: 1. i(x) ∈ A for every x, 2. |i(x)| ≤ |x| + c, where c is a fixed constant (one can actually take c := log 1/ε ). D1 (i(x)) := D(x).
  • 27. The construction It remains to build a recursive set A with the following properties: 1. A is sufficiently dense, 2. A does not contain the domain of any optimal prefix-free decompressor.
  • 28. The construction It remains to build a recursive set A with the following properties: 1. A is sufficiently dense, 2. A does not contain the domain of any optimal prefix-free decompressor. A will be, in some sense, a universal set. For every n consider strings of length n in the set A. They determine some subset in Cantor space, which is open-closed. What is needed for A: every open-closed subset of Cantor space of measure at least 1/3 is represented at some level and even at many subsequent levels
  • 29. The construction It remains to build a recursive set A with the following properties: 1. A is sufficiently dense, 2. A does not contain the domain of any optimal prefix-free decompressor. A will be, in some sense, a universal set. For every n consider strings of length n in the set A. They determine some subset in Cantor space, which is open-closed. What is needed for A: every open-closed subset of Cantor space of measure at least 1/3 is represented at some level and even at many subsequent levels Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω
  • 30. The construction It remains to build a recursive set A with the following properties: 1. A is sufficiently dense, 2. A does not contain the domain of any optimal prefix-free decompressor. A will be, in some sense, a universal set. For every n consider strings of length n in the set A. They determine some subset in Cantor space, which is open-closed. What is needed for A: every open-closed subset of Cantor space of measure at least 1/3 is represented at some level and even at many subsequent levels Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω Ωx = {α ∈ {0, 1}ω | α begins with x}
  • 31. The construction It remains to build a recursive set A with the following properties: 1. A is sufficiently dense, 2. A does not contain the domain of any optimal prefix-free decompressor. A will be, in some sense, a universal set. For every n consider strings of length n in the set A. They determine some subset in Cantor space, which is open-closed. What is needed for A: every open-closed subset of Cantor space of measure at least 1/3 is represented at some level and even at many subsequent levels Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω Ωx = {α ∈ {0, 1}ω | α begins with x} P ⊆ {0, 1}ω is basic if P = n Ωxi . i=1
  • 32. The construction It remains to build a recursive set A with the following properties: 1. A is sufficiently dense, 2. A does not contain the domain of any optimal prefix-free decompressor. A will be, in some sense, a universal set. For every n consider strings of length n in the set A. They determine some subset in Cantor space, which is open-closed. What is needed for A: every open-closed subset of Cantor space of measure at least 1/3 is represented at some level and even at many subsequent levels Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω Ωx = {α ∈ {0, 1}ω | α begins with x} P ⊆ {0, 1}ω is basic if P = n Ωxi . i=1 A ⊆ {0, 1}∗ represents P at level n if P = x∈A∩{0,1}n Ωx .
  • 33. The construction It remains to build a recursive set A with the following properties: 1. A is sufficiently dense, 2. A does not contain the domain of any optimal prefix-free decompressor. A will be, in some sense, a universal set. For every n consider strings of length n in the set A. They determine some subset in Cantor space, which is open-closed. What is needed for A: every open-closed subset of Cantor space of measure at least 1/3 is represented at some level and even at many subsequent levels Infinite binary tree ↔ {0, 1}∗ ↔ cylinders in {0, 1}ω Ωx = {α ∈ {0, 1}ω | α begins with x} P ⊆ {0, 1}ω is basic if P = n Ωxi . i=1 A ⊆ {0, 1}∗ represents P at level n if P = x∈A∩{0,1}n Ωx . Construction of A: for every basic set P of measure at least 1/3 there are infinitely many n such that A represents P at levels n, n + 1, . . . , 2n.
  • 35. Two games Lemma: if ni is a computable sequence such that −ni ≤ 1, then K (i) ≤ n + O(1). i2 i
  • 36. Two games Lemma: if ni is a computable sequence such that −ni ≤ 1, then K (i) ≤ n + O(1). i2 i ’Memory allocation’ game: Alice: ni such that i 2−ni ≤ 1 (one by one). Bob: xi such that |xi | = ni and {xi } is prefix-free set (responds on-line). Bob wins if he is able to allocate desired strings. Theorem: Bob wins.
  • 38. Two games The modified game: Bob: ε > 0. Alice: makes at most 2/3 strings of each length forbidden. Alice: ni such that i 2−ni ≤ ε (one by one). Bob: xi such that |xi | = ni and {xi } is prefix-free set. Moreover, xi must not be forbidden (responds on-line). Bob wins if he is able to allocate desired strings. Theorem: Alice wins.
  • 39. Two games The modified game: Bob: ε > 0. Alice: makes at most 2/3 strings of each length forbidden. Alice: ni such that i 2−ni ≤ ε (one by one). Bob: xi such that |xi | = ni and {xi } is prefix-free set. Moreover, xi must not be forbidden (responds on-line). Bob wins if he is able to allocate desired strings. Theorem: Alice wins. Technically, we must consider more complicated game, because complexity is defined up to a constant.
  • 40. Two games The modified game: Bob: ε > 0. Alice: makes at most 2/3 strings of each length forbidden. Alice: ni such that i 2−ni ≤ ε (one by one). Bob: xi such that |xi | = ni and {xi } is prefix-free set. Moreover, xi must not be forbidden (responds on-line). Bob wins if he is able to allocate desired strings. Theorem: Alice wins. Technically, we must consider more complicated game, because complexity is defined up to a constant. The idea of a proof is the following: Alice wins, and her winning set is more or less A.
  • 41. Thank you for your attention.