This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: University of Hawai‘i at Mānoa, Honolulu HI 96822, U.S.A.,
11email: [email protected], [email protected],
WWW home page: http://math.hawaii.edu/wordpress/bjoern/

Strong Medvedev reducibilities and the KL-randomness problem

Bjørn Kjos-Hanssen This work was partially supported by a grant from the Simons Foundation (#704836 to Bjørn Kjos-Hanssen). The authors would like to thank Reviewer 2 for Theorem 3.1. The second author would also like to thank Carl Eadler for pointing him towards results about Karnaugh maps, which were helpful in thinking about Theorem 2.3.11 0000-0002-1825-0097    David J. Webb 11 0000-0002-5031-7669
(January 2022)
Abstract

While it is not known whether each real that is Kolmogorov-Loveland random is Martin-Löf random, i.e., whether KLRMLR\operatorname{KLR}\subseteq\operatorname{MLR}, Kjos-Hanssen and Webb (2021) showed that MLR is truth-table Medvedev reducible (s,tt\leq_{s,tt}) to KLR. They did this by studying a natural class Either(MLR) and showing that MLRs,ttEither(MLR)KLR\operatorname{MLR}\leq_{s,tt}\operatorname{Either}(\operatorname{MLR})\supseteq\operatorname{KLR}. We show that Degtev’s stronger reducibilities (positive and linear) do not suffice for the reduction of MLR to Either(MLR), and some related results.

Keywords:
Martin-Löf randomness, Medvedev reducibility, truth-table reducibility

1 Introduction

The theory of algorithmic randomness attempts to study randomness of not just random variables, but individual outcomes. The idea is to use computability theory and declare that an outcome is random if it “looks random to any computer”. This can be made precise in several ways (with notions such as Martin-Löf randomness and Schnorr randomness), whose interrelation is for the most part well understood [MR2732288, MR2548883]. However, a remaining major open problem of algorithmic randomness asks whether each Kolmogorov–Loveland random (KL-random) real is Martin-Löf random (ML-random).

It is known that one can compute an ML-random real from a KL-random real [MR2183813] and even uniformly so [KHW]. This uniform computation succeeds in an environment of uncertainty, however: one of the two halves of the KL-random real is already ML-random and we can uniformly stitch together a ML-random without knowing which half. In this article we pursue this uncertainty and are concerned with uniform reducibility when information has been hidden in a sense. Namely, for any class of reals 𝒞2ω\mathcal{C}\subseteq 2^{\omega}, we write

Either(𝒞)={AB:A𝒞 or B𝒞},\operatorname{Either}(\mathcal{C})=\{A\oplus B:A\in\mathcal{C}\text{ or }B\in\mathcal{C}\},

where ABA\oplus B is the computability-theoretic join:

AB={2kkA}{2k+1kB}.A\oplus B=\{2k\mid k\in A\}\cup\{2k+1\mid k\in B\}.

For notation, we often refer to ‘even’ bits of such a real as those coming from AA, and ‘odd’ bits coming from BB.

An element of Either(𝒞)\operatorname{Either}(\mathcal{C}) has an element of 𝒞\mathcal{C} available within it, although in a hidden way. We are not aware of the Either\operatorname{Either} operator being studied in the literature, although Higuchi and Kihara [HIGUCHI20141201, Lemma 4] (see also [HIGUCHI20141058]) considered the somewhat more general operation f(𝒞,𝒟)=(2ω𝒞)(𝒟2ω)f(\mathcal{C},\mathcal{D})=(2^{\omega}\oplus\mathcal{C})\cup(\mathcal{D}\oplus 2^{\omega}).

A real AA is Martin-Löf random iff there is a positive constant cc so that for any nn, the Kolmogorov complexity of the first nn bits of AA is at least ncn-c, (that is, n,K(Ain)nc\forall n,\ K(A_{i}\upharpoonright n)\geq n-c).

This is one of several equivalent definitions – for instance, AA is Martin-Löf random (AMLRA\in\operatorname{MLR}) iff no c.e. martingale succeeds on it. In contrast, AA is Kolomogorov-Loveland random (AKLRA\in\operatorname{KLR}) iff no computable nonmonotonic betting strategy succeeds on it.

As MLRKLR\operatorname{MLR}\subseteq\operatorname{KLR}, KLR is trivially Medvedev reducible to MLR. In [KHW], Either\operatorname{Either} is implicitly used to show the reverse, that MLR is Medvedev reducible to KLR. For a reducibility rr, such as r=ttr=tt (truth-table, Definition 1) or r=Tr=T (Turing), let s,r\leq_{s,r} denote strong (Medvedev) reducibility using rr-reductions, and w,r\leq_{w,r} the corresponding weak (Muchnik) reducibility.

Theorem 1.1

MLRs,ttEither(MLR)\operatorname{MLR}\leq_{s,tt}\operatorname{Either}(\operatorname{MLR}).

Proof

[KHW, Theorem 2] shows that MLRs,ttKLR\operatorname{MLR}\leq_{s,tt}\operatorname{KLR}. The proof demonstrates that MLRs,ttEither(MLR)\operatorname{MLR}\leq_{s,tt}\operatorname{Either}(\operatorname{MLR}) and notes, by citation to [MR2183813], that KLREither(MLR)\operatorname{KLR}\subseteq\operatorname{Either}(\operatorname{MLR}). ∎

In fact, the proof shows that the two are truth-table Medvedev equivalent. A natural question is whether they are Medvedev equivalent under any stronger reducibility.

Let DIM1/2\operatorname{DIM}_{1/2} be the class of all reals of effective Hausdorff dimension 1/2. Theorem 1.1 is a counterpoint to Miller’s result MLRw,TDIM1,2\operatorname{MLR}\not\leq_{w,T}\operatorname{DIM}_{1,2} [ExtractInfo], since MLRs,ttDIM1,2Either(MLR)\operatorname{MLR}\not\leq_{s,tt}\operatorname{DIM}_{1,2}\supseteq\operatorname{Either}(\operatorname{MLR}).

Definition 1

Let {σnnω}\{\sigma_{n}\mid n\in\omega\} be a uniformly computable list of all the finite propositional formulas in variables v1,v2,v_{1},v_{2},\dots. Let the variables in σn\sigma_{n} be vn1,,vndv_{n_{1}},\dots,v_{n_{d}} where dd depends on nn. We say that XσnX\models\sigma_{n} if σn\sigma_{n} is true with X(n1),,X(nd)X(n_{1}),\dots,X(n_{d}) substituted for vn1,,vndv_{n_{1}},\dots,v_{n_{d}}. A reduction ΦX\Phi^{X} is a truth-table reduction if there is a computable function ff such that for each nn and XX, nΦXn\in\Phi^{X} iff Xσf(n)X\models\sigma_{f(n)}.

For two classes of reals 𝒞,𝒟\mathcal{C},\mathcal{D}, we write 𝒞s,𝒟\mathcal{C}\leq_{s,*}\mathcal{D} to mean that there is a *-reduction Φ\Phi such that ΦD𝒞\Phi^{D}\in\mathcal{C} for each D𝒟D\in\mathcal{D}, where * is a subscript in Table 1.

As shown in Figure 1, the next three candidates to strengthen the result (by weakening the notion of reduction under consideration) are the positive, linear, and bounded truth-table reducibilties. Unfortunately, any proof technique using Either\operatorname{Either} will no longer work, as for these weaker reducibilities, MLR\operatorname{MLR} is not Medvedev reducible to Either(MLR)\operatorname{Either}(\operatorname{MLR}).

2 The Failure of Weaker Reducibilities

When discussing the variables in a table σf(n)\sigma_{f(n)}, we say that a variable is of a certain parity if its index is of that parity, i.e. n2n_{2} is an even variable. As our reductions operate on 2ω2^{\omega}, we identify the values X(ni)X(n_{i}) with truth values as 1=1=\top and 0=0=\bot.

Definition 2

A truth-table reduction ΦX\Phi^{X} is a positive reduction if the only connectives in each σf(n)\sigma_{f}(n) are \lor and \land.

Theorem 2.1

MLRs,pEither(MLR)\operatorname{MLR}\not\leq_{s,p}\operatorname{Either}(\operatorname{MLR}).

Proof

Let ΦX\Phi^{X} be a positive reduction. By definition, for each input nn, σf(n)\sigma_{f(n)} can be written in conjunctive normal form: σf(n)=k=1tni=1mkvf(n),i,k\sigma_{f(n)}=\bigwedge_{k=1}^{t_{n}}\bigvee_{i=1}^{m_{k}}v_{f(n),i,k}. We say that a clause of σf(n)\sigma_{f(n)} is a disjunct i=1mkvf(n),i,k\bigvee_{i=1}^{m_{k}}v_{f(n),i,k}. There are two cases to consider:

Case 1: There is a parity such that there are infinitely many nn such that every clause of σf(n)\sigma_{f(n)} contains a variable.

Without loss of generality, consider the even case. Let A=ωRA=\omega\oplus R for RR an arbitrary random real. Each i=1mkvn,i,k\bigvee_{i=1}^{m_{k}}v_{n,i,k} that contains an even variable is true. So for the infinitely many nn whose disjunctions all query an even variable, σf(n)=k=1tn=\sigma_{f(n)}=\bigwedge_{k=1}^{t_{n}}\top=\top. As these infinitely many nn can be found computably, ΦA\Phi^{A} is not immune, and so not random.

Case 2: For either parity, for almost all inputs nn, there is a clause of σf(n)\sigma_{f(n)} containing only variables of that parity.

Set A=RA=R\oplus\emptyset for an arbitrary random real RR. For almost all inputs, some clause is a disjunction of \bot, so that the entire conjunction is false. Thus ΦA\Phi^{A} is cofinitely often 0, and hence computable, and so not random.∎

Reducibility Subscript Connectives
truth table tttt any
bounded tttt bttbtt any
btt(1)btt(1) btt(1)btt(1) {¬}\{\lnot\}
linear \ell {+}\{+\}
positive pp {,}\{\land,\lor\}
conjunctive cc {}\{\land\}
disjunctive dd {}\{\lor\}
many-one mm none
Table 1: Correspondences between reducibilities and sets in Post’s Lattice. Here ++ is addition mod 2 (also commonly written XOR). Note that while a bttbtt reduction can use any connectives, there is a bound cc on how many variables each σf(n)\sigma_{f(n)} can have, hence if c=1c=1 the only connective available is ¬\lnot.

d\textstyle{d\ignorespaces\ignorespaces\ignorespaces\ignorespaces}p\textstyle{p\ignorespaces\ignorespaces\ignorespaces\ignorespaces}1\textstyle{1\ignorespaces\ignorespaces\ignorespaces\ignorespaces}m\textstyle{m\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces}c\textstyle{c\ignorespaces\ignorespaces\ignorespaces\ignorespaces}\textstyle{\ell\ignorespaces\ignorespaces\ignorespaces\ignorespaces}tt\textstyle{tt\ignorespaces\ignorespaces\ignorespaces\ignorespaces}T\textstyle{T}btt(1)\textstyle{btt(1)\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces\ignorespaces}btt\textstyle{btt\ignorespaces\ignorespaces\ignorespaces\ignorespaces}

Figure 1: [OdiRed] The relationships between reducibilities in Table 1, which themselves are between 1\leq_{1} and T\leq_{T}. Here xyx\rightarrow y indicates that if two reals AA and BB enjoy AxBA\leq_{x}B, then also AyBA\leq_{y}B.
Remark 1

The proof of Theorem 2.1 also applies to randomness over 3ω3^{\omega} (and beyond). To see this, we consider the alphabet {0,1,2}\{0,1,2\} and let each p(j)p(j) be an identity function and ,\vee,\wedge be the maximum and minimum under the ordering 0<1<20<1<2.

Definition 3

A truth-table reduction ΦX\Phi^{X} is a linear reduction if each σf(n)\sigma_{f(n)} is of the form σf(n)=k=1tnvf(n),k\sigma_{f(n)}=\sum_{k=1}^{t_{n}}v_{f(n),k} or σf(n)=1+k=1tnvf(n),k\sigma_{f(n)}=1+\sum_{k=1}^{t_{n}}v_{f(n),k} where addition is mod 2.

Theorem 2.2

MLRs,Either(MLR)\operatorname{MLR}\not\leq_{s,\ell}\operatorname{Either}(\operatorname{MLR}).

Proof

We may assume that Φ\Phi infinitely often queries a bit that it has not queried before (else ΦA\Phi^{A} is always computable). Without loss of generality, suppose Φ\Phi infinitely often queries an even bit it has not queried before. We construct AA in stages, beginning with A0=RA_{0}=\emptyset\oplus R for RR an arbitrary random real.

For the infinitely many nin_{i} that query an unqueried even bit, let viv_{i} be the least such bit. Then at stage s+1s+1, set vi=1v_{i}=1 if ΦAs(ni)=0\Phi^{A_{s}}(n_{i})=0. Changing a single bit in a linear σf(ni)\sigma_{f(n_{i})} changes the output of σf(ni)\sigma_{f(n_{i})}, so that ΦA(n)=ΦAs+1(ni)=1\Phi^{A}(n)=\Phi^{A_{s+1}}(n_{i})=1.

As these nin_{i} form a computable set, ΦA\Phi^{A} fails to be immune, and so cannot be random.∎

Definition 4

A truth-table reduction ΦX\Phi^{X} is a bounded truth-table reduction if there is a cc such that there are most cc variables in each σf(n)\sigma_{f(n)} (in particular we say it is a btt(c)btt(c) reduction).

Theorem 2.3

MLRs,bttEither(MLR)\operatorname{MLR}\not\leq_{s,btt}\operatorname{Either}(\operatorname{MLR}).

Proof

Suppose that Φ\Phi is a bttbtt-reduction from Either(MLR)\operatorname{Either}(\operatorname{MLR}) to MLR\operatorname{MLR} and let cc be its bound on the number of oracle bits queried. We proceed by induction on cc, working to show that an X=X0X1X=X_{0}\oplus X_{1} exists with X0X_{0} or X1X_{1} ML-random, for which ΦX\Phi^{X} is not bi-immune.

Base for the induction (c=1c=1). As btt(1)btt(1) reductions are linear, it is enough to appeal to Theorem 2.2. But as a warmup for what follows, we shall prove this case directly. Let Φ\Phi be a btt(1)btt(1) reduction. Here ΦX(n)=fn(X(q(n))\Phi^{X}(n)=f_{n}(X(q(n)) where fn:{0,1}{0,1}f_{n}:\{0,1\}\to\{0,1\}, q:ωωq:\omega\to\omega is computable, and {fn}nω\{f_{n}\}_{n\in\omega} is computable. (If no bits are queried on input nn, let fnf_{n} be the appropriate constant function.)

If for infinitely many nn, fnf_{n} is the constant function 11 or 0, and the claim is obvious.

Instead, suppose fnf_{n} is only constant finitely often, i.e. fn(x)=xf_{n}(x)=x or fn(x)=1xf_{n}(x)=1-x cofinitely often. Without loss of generality, there are infinitely many nn such that q(n)q(n) is even. Let X=RX=\emptyset\oplus R, where RR is an arbitrary ML-random set.

As X(q(n))=0X(q(n))=0 and f(x)f(x) is either identity or 1x1-x infinitely often, there is an infinite computable subset of either ΦX\Phi^{X} or ΦX¯\overline{\Phi^{X}} so ΦX\Phi^{X} is not bi-immune.

Induction step. Assume the c1c-1 case, and consider a btt(c)btt(c) reduction Φ\Phi.

Now there are uniformly computable finite sets Q(n)={q1(n),,qdn(n)}Q(n)=\{q_{1}(n),\dots,q_{d_{n}}(n)\} and Boolean functions fn:{0,1}dn{0,1}f_{n}:\{0,1\}^{d_{n}}\to\{0,1\} such that for all nn, ΦX(n)=fn(X(q1(n)),,X(qdn(n)))\Phi^{X}(n)=f_{n}(X({q_{1}(n)}),\dots,X(q_{d_{n}}(n))) and dncd_{n}\leq c.

Consider the greedy algorithm that tries to find a collection of pairwise disjoint Q(ni)Q(n_{i}) as follows:

  • -

    n0=0n_{0}=0.

  • -

    ni+1n_{i+1} is the least nn such that Q(n)k<iQ(nk)=Q(n)\cap\bigcup_{k<i}Q(n_{k})=\emptyset.

If this algorithm cannot find an infinite sequence, let ii be least such that ni+1n_{i+1} is undefined, and define H=kiQ(nk)H=\bigcup_{k\leq i}Q(n_{k}). It must be that for n>nin>n_{i} no intersection Q(n)HQ(n)\cap H is empty. Thus there are finitely many bits that are in infinitely many of these intersections, and so are queried infinitely often. We will “hard code” the bits of HH as 0 in a new function Φ^\hat{\Phi}.

To that end, define Q^(n)=Q(n)H\hat{Q}(n)=Q(n)\setminus H, and let f^\hat{f} be the function that outputs the same truth tables as ff, but for all nHn\in H, vnv_{n} is replaced with \bot. List the elements of Q^\hat{Q} in increasing order as {q^1(n),,q^en(n)}\{\hat{q}_{1}(n),\dots,\hat{q}_{e_{n}}(n)\}. Now if XH=X\cap H=\emptyset, any qi(n)Hq_{i}(n)\in H have X(qi(n))=0X(q_{i}(n))=0, so that ΦX=Φ^X\Phi^{X}=\hat{\Phi}^{X}, as for every nn,

f(X(q1(n)),X(qdn(n)))=fn^(X(q^1(n)),,X(q^en(n)).f(X(q_{1}(n)),\dots X(q_{d_{n}}(n)))=\hat{f_{n}}(X(\hat{q}_{1}(n)),\dots,X(\hat{q}_{e_{n}}(n)).

As QQ and the fnf_{n} are uniformly computable and HH is finite, Q^\hat{Q} and the f^n\hat{f}_{n} are also uniformly computable. As no intersection Q(n)HQ(n)\cap H was empty, en<dnce_{n}<d_{n}\leq c. So Q^\hat{Q} and the f^n\hat{f}_{n} define a btt(c1)btt(c-1)-reduction. By the induction hypothesis, there is a real AEither(MLR)A\in\operatorname{Either}(\operatorname{MLR}) such that Φ^A\hat{\Phi}^{A} is not random. Either(MLR)\operatorname{Either}(\operatorname{MLR}) is closed under finite differences (as MLR\operatorname{MLR} is), so the set B=AHB=A\setminus H witnesses ΦB=Φ^A\Phi^{B}=\hat{\Phi}^{A}, and ΦB\Phi^{B} is not random as desired.

This leaves the case where the algorithm enumerates a sequence of pairwise disjoint Q(ni)Q(n_{i}).

Say that a collection of bits C(n)Q(n)C(n)\subseteq Q(n) can control the computation ΦX(n)\Phi^{X}(n) if there is a way to assign the bits in CnC_{n} so that ΦX(n)\Phi^{X}(n) is the same no matter what the other bits in Q(n)Q(n) are. For example, (ab)c(a\land b)\lor c can be controlled by {a,b}\{a,b\}, by setting a=b=1a=b=1. Note that if the bits in C(n)C(n) are assigned appropriately, ΦX(n)\Phi^{X}(n) is the same regardless of what the rest of XX looks like.

Suppose now that there are infinitely many nin_{i} such that some C(ni)C(n_{i}) containing only even bits controls ΦX(ni)\Phi^{X}(n_{i}). Collect these nin_{i} into a set EE. Let X1X_{1} be an arbitrary ML-random set. As there are infinitely many nin_{i}, and it is computable to determine whether an assignment of bits controls ΦX(n)\Phi^{X}(n), EE is an infinite computable set. For nEn\in E, we can assign the bits in Q(n)Q(n) to control ΦX(n)\Phi^{X}(n), as the Q(n)Q(n) are mutually disjoint. Now one of the sets

{nEΦX(n)=0}\displaystyle\{n\in E\mid\Phi^{X}(n)=0\} or {nEΦX(n)=1}\displaystyle\{n\in E\mid\Phi^{X}(n)=1\}

is infinite. Both are computable, so in either case ΦX\Phi^{X} is not bi-immune.

Now suppose that cofinitely many of the nin_{i} cannot be controlled by their even bits. Here let X0X_{0} be an arbitrary ML-random set. For sufficiently large nin_{i}, no matter the values of the even bits in Q(ni)Q(n_{i}), there is a way to assign the odd bits so that ΦX(ni)=1\Phi^{X}(n_{i})=1. By pairwise disjointness, we can assign the odd bits of Q(ni)\bigcup Q(n_{i}) as needed to ensure this, and assign the rest of the odd bits of XX however we wish. Now the nin_{i} witness the failure of ΦX\Phi^{X} to be immune. ∎

3 Arbitrarily many columns

It is worth considering direct sums with more than two summands. In this new setting, we first prove the analog of Theorem 2 of [KHW] for more than two columns, before sketching the modifications necessary to prove analogues of Theorems 2.1, 2.2 and 2.3.

Recall that the infinite direct sum i=0ωAi\bigoplus_{i=0}^{\omega}A_{i} is defined as {i,nnAi}\{\langle i,n\rangle\mid n\in A_{i}\}, where ,:ω2ω\langle\cdot,\cdot\rangle:\omega^{2}\rightarrow\omega is a fixed computable bijection.

Definition 5

For each 𝒞2ω\mathcal{C}\subseteq 2^{\omega} and ordinal αω\alpha\leq\omega, define

Some(𝒞,α)\displaystyle\operatorname{Some}(\mathcal{C},\alpha) =\displaystyle= {i=0αAi2ω|iAi𝒞},\displaystyle\left\{\bigoplus_{i=0}^{\alpha}A_{i}\in 2^{\omega}\middle|\exists i\ A_{i}\in\mathcal{C}\right\},
Many(𝒞)\displaystyle\operatorname{Many}(\mathcal{C}) =\displaystyle= {i=0ωAi2ω|iAi𝒞}.\displaystyle\left\{\bigoplus_{i=0}^{\omega}A_{i}\in 2^{\omega}\middle|\exists^{\infty}i\ A_{i}\in\mathcal{C}\right\}.

These represent different ways to generalize Either(𝒞)\operatorname{Either}(\mathcal{C}) to the infinite setting: we may know that some possibly finite number of columns AiA_{i} are in 𝒞\mathcal{C}, or that infinitely many columns are in 𝒞\mathcal{C}. If α=ω\alpha=\omega, these notions are mm-equivalent, so we can restrict our attention to Some(MLR,α)\operatorname{Some}(\operatorname{MLR},\alpha) without loss of generality:

Theorem 3.1 (due to Reviewer 2)

Some(𝒞,ω)s,mMany(𝒞)\operatorname{Some}(\mathcal{C},\omega)\equiv_{s,m}\operatorname{Many}(\mathcal{C}).

Proof

The s,m\leq_{s,m} direction follows from the inclusion Many(𝒞)Some(𝒞,ω)\operatorname{Many}(\mathcal{C})\subseteq\operatorname{Some}(\mathcal{C},\omega).

For s,m\geq_{s,m}, let BSome(𝒞,ω)B\in\operatorname{Some}(\mathcal{C},\omega) and define AA by:

i,j,nAi,nB\langle\langle i,j\rangle,n\rangle\in A\iff\langle i,n\rangle\in B

Then AmBA\leq_{m}B and AMany(𝒞)A\in\operatorname{Many}(\mathcal{C}), so that Some(𝒞,ω)s,mMany(𝒞)\operatorname{Some}(\mathcal{C},\omega)\geq_{s,m}\operatorname{Many}(\mathcal{C}). ∎

3.1 Truth-Table Reducibility

Recall that a real AA is Martin-Löf random iff there is a positive constant cc (the randomness deficiency) so that for any nn, K(Ain)ncK(A_{i}\upharpoonright n)\geq n-c). Let Ks(σ)K_{s}(\sigma) be a computable, non-increasing approximation of K(σ)K(\sigma) at stages sωs\in\omega.

Theorem 3.2

For all ordinals αω\alpha\leq\omega, MLRs,ttSome(MLR,α)\operatorname{MLR}\leq_{s,tt}\operatorname{Some}(\operatorname{MLR},\alpha).

Proof

Given a set A=i=0αAiA=\bigoplus_{i=0}^{\alpha}A_{i}, we start by outputting bits from A0A_{0}, switching to the next AiA_{i} whenever we notice that the smallest possible randomness deficiency increases. This constant cc depends on ss and changes at stage s+1s+1 if

(ns+1)Ks+1(Ain)<ncs.(\exists n\leq s+1)\quad K_{s+1}(A_{i}\upharpoonright n)<n-c_{s}. (1)

In detail, fix a map π:ωα\pi:\omega\rightarrow\alpha so that for all yy, the preimage π1({y})\pi^{-1}(\{y\}) is infinite. Let n(0)=0n(0)=0, and if Equation 1 occurs at stage ss, set n(s+1)=n(s)+1n(s+1)=n(s)+1, otherwise n(s+1)=n(s)n(s+1)=n(s). Finally, define A(s)=Aπ(n(s))(s)A(s)=A_{\pi(n(s))}(s).

As some AiA_{i} is in MLR\operatorname{MLR}, switching will only occur finitely often. So there is an stage ss such that for all larger tt, A(t)=Ai(t)A(t)=A_{i}(t). Thus our output will have an infinite tail that is ML-random, and hence will itself be ML-random.

To guarantee that this is a truth-table reduction, we must check that this procedure always halts. But this is immediate, as Equation 1 is computable for all sωs\in\omega and Ai2ωA_{i}\in 2^{\omega}.∎

3.2 Positive Reducibility

We say that a variable is from a certain column if its index codes a location in that column, i.e. nkn_{k} is from AiA_{i} if k=i,nk=\langle i,n\rangle for some nn.

Theorem 3.3

For all αω\alpha\leq\omega, MLRs,pSome(MLR,α)\operatorname{MLR}\not\leq_{s,p}\operatorname{Some}(\operatorname{MLR},\alpha).

Proof

Let ΦX\Phi^{X} be a positive reduction. Assume each σf(n)\sigma_{f(n)} is written in conjunctive normal form. We sketch the necessary changes to the proof of Theorem 2.1:

Case 1: There is an ii such that there are infinitely many nn such that every clause of σf(n)\sigma_{f}(n) contains a variable from AiA_{i}.

Without loss of generality, let that column be A0=ωA_{0}=\omega. The remaining AiA_{i} can be arbitrary, as long as one of them is random.

Case 2: For all ii, for almost all nn, there is a clause in σf(n)\sigma_{f}(n) that contains no variables from AiA_{i}.

In particular this holds for i=0i=0, so let A0MLRA_{0}\in\operatorname{MLR} and the remaining Ai=A_{i}=\emptyset.∎

3.3 Linear Reducibility

Theorem 3.4

For all αω\alpha\leq\omega, MLRs,Some(MLR,α)\operatorname{MLR}\not\leq_{s,\ell}\operatorname{Some}(\operatorname{MLR},\alpha).

Proof

We may assume that Φ\Phi infinitely often queries a bit it has not queried before (else ΦA\Phi^{A} is always computable). If there is an ii such that Φ\Phi infinitely often queries a bit of AiA_{i} it has not queried before, the stage construction from Theorem 2.2 can be carried out with AiA_{i} standing in for A0A_{0}, and some other AjMLRA_{j}\in\operatorname{MLR}.

That case always occurs for α<ω\alpha<\omega, but may not when α=ω\alpha=\omega. That is, it may the the case that Φ\Phi only queries finitely many bits of each AiA_{i}. Letting each AiA_{i} be random, these bits may be set to 0 without affecting the randomness of any given column, so we could set A0MLRA_{0}\in\operatorname{MLR} while other Ai=A_{i}=\emptyset. ∎

3.4 Bounded Truth-Table Reducibility

As btt(1)btt(1) reductions are linear, Theorem 3.4 provides the base case for induction arguments in the vein of Theorem 2.3. So for each theorem, we can focus our attention on the induction step:

Theorem 3.5

For all αω\alpha\leq\omega, Many(MLR)s,bttSome(MLR,α)\operatorname{Many}(\operatorname{MLR})\not\leq_{s,btt}\operatorname{Some}(\operatorname{MLR},\alpha).

Proof

In the induction step, the case where the greedy algorithm fails is unchanged. Instead, consider the case where the algorithm enumerates a sequence of pairwise disjoint Q(ni)Q(n_{i}). If there is a column AjA_{j} such that there are infinitely many nin_{i} such that some C(ni)C(n_{i}) containing only bits from AjA_{j} controls ΦX(n)\Phi^{X}(n), then we proceed as in Theorem 2.3: start with some other AkMLRA_{k}\in\operatorname{MLR} while the remaining columns are empty. We can then set the bits in each Q(ni)Q(n_{i}) to control ΦX(ni)\Phi^{X}(n_{i}) to guarantee that ΦX\Phi^{X} is not bi-immune. This only changes bits in AjA_{j}, not AkA_{k}, so the final ASome(MLR,α)A\in\operatorname{Some}(\operatorname{MLR},\alpha).

This leaves the case where for each AjA_{j}, cofinitely many of the nin_{i} cannot be controlled by their bits in AjA_{j}. Here put A0MLRA_{0}\in\operatorname{MLR} and assign bits to the other columns as in Theorem 2.3.∎

4 On the Medvedev mm-reducibility of MLR to (a.e.-)KLR

Let μ\mu denote the Lebesgue fair-coin measure on 2ω2^{\omega}. It enjoys the familiar probabilistic properties such as Lemma 1:

Lemma 1

Let 𝒞,𝒟2ω\mathcal{C},\mathcal{D}\subseteq 2^{\omega}. If μ(𝒞)=1\mu(\mathcal{C})=1 and μ(𝒟)=1\mu(\mathcal{D})=1 then μ(𝒞𝒟)=1\mu(\mathcal{C}\cap\mathcal{D})=1.

Given a randomness notion 𝒞\mathcal{C}, we say that a set AA is almost everywhere 𝒞\mathcal{C}-random111This notion was previously defined for the class of computable randoms in [AECompRand]. if μ{BA𝒞B}=1\mu\{B\mid A\in\mathcal{C}^{B}\}=1. The following is an easy corollary of van Lambalgen’s theorem:

Theorem 4.1

a.e.MLR=MLR\operatorname{a.e.-MLR}=\operatorname{MLR}.

Proof

The \subseteq direction is immediate – if AA is random relative to some oracle, it is random relative to having no oracle, so AMLRA\in\operatorname{MLR}. For the reverse, let AMLRA\in\operatorname{MLR}. If BMLRAB\in\operatorname{MLR}^{A}, then AMLRBA\in\operatorname{MLR}^{B} by van Lambalgen’s theorem. Thus μ{BAMLRB}μ(MLRA)=1\mu\{B\mid A\in\operatorname{MLR}^{B}\}\geq\mu(\operatorname{MLR}^{A})=1, so that Aa.e.MLRA\in\operatorname{a.e.-MLR}.

The corresponding theorem for a.e.KLR\operatorname{a.e.-KLR} and KLR\operatorname{KLR} is an open question, and in fact whether KLR\operatorname{KLR} satisfies a version of van Lambalgen’s theorem is also open [VanLam]. The situation can be summarized as follows:

a.e.MLR=MLRa.e.KLRKLR.\operatorname{a.e.-MLR}=\operatorname{MLR}\subseteq\operatorname{a.e.-KLR}\subseteq\operatorname{KLR}.

Here we investigate possible connections between MLR\operatorname{MLR} and a.e.KLR\operatorname{a.e.-KLR}.

Write f:ABf:A\to B to indicate that ff is a total function from AA to BB. No confusion is likely if, in addition to the Lebesgue measure on 2ω2^{\omega}, μ\mu also denotes the least number operator as follows: for an arithmetic predicate R(k)R(k), μk(R(k))\mu k(R(k)) is the least kk such that R(k)R(k) is true.

Let f:ωωf:\omega\to\omega with range f[w]f[w], and define finv:f[ω]ωf^{\mathrm{inv}}:f[\omega]\to\omega by finv(n)=μm(f(m)=n)f^{\mathrm{inv}}(n)=\mu m(f(m)=n). Let g:ωωg:\omega\to\omega be defined by g(0)=f(0)g(0)=f(0), and

g(n+1)=f(μk(f(k)>g(n))).g(n+1)=f(\mu k(f(k)>g(n))).

If ff is unbounded then g:ωωg:\omega\to\omega is total. If in addition ff is Δ10\Delta^{0}_{1}, then so is gg. In fact, if ff is unbounded and Δ10\Delta^{0}_{1} then g[ω]g[\omega] is infinite and Δ10\Delta^{0}_{1}.