Deciding Robust Instances of an Escape Problem for Dynamical Systems in Euclidean Space
Abstract
We study the problem of deciding whether a point escapes a closed subset of under the iteration of a continuous map in the bit-model of real computation. We give a sound partial decision method for this problem which is complete in the sense that its halting set contains the halting set of all sound partial decision methods for the problem. Equivalently, our decision method terminates on all problem instances whose answer is robust under all sufficiently small perturbations of the function. We further show that the halting set of our algorithm is dense in the set of all problem instances. While our algorithm applies to general continuous functions, we demonstrate that it also yields complete decision methods for much more rigid function families: affine linear systems and quadratic complex polynomials. In the latter case, completeness is subject to the density of hyperbolicity conjecture in complex dynamics. This in particular yields an alternative proof of Hertling’s (2004) conditional answer to a question raised by Penrose (1989) regarding the computability of the Mandelbrot set.
Keywords and phrases:
Dynamical Systems, Computability in Analysis, Non-Linear Functions2012 ACM Subject Classification:
Theory of computationFunding:
This work was supported by Swansea University.Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał SkrzypczakSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
A large number of problems in a diverse range of areas, such as program verification [31], numerical analysis [40, 35], economics [4], probabilistic systems [1, 6], and biology [45, 24] reduce to a problem of the following type: Given a set , a function , and a point , decide whether escapes under finitely many iterations of .
Unsurprisingly, the study of automated methods for the solution of such problems has received much attention [41, 43, 29, 28, 30, 27, 21, 36, 37, 19, 16, 5, 20].
Existing work on automated decision methods largely focusses on linear systems. In fact, the scope of automated decision methods for non-linear systems appears to be quite limited: the above problem is undecidable [42] already when is a piecewise linear function and is a polyhedron in .
All of the aforementioned results assume that the system is specified exactly, by means of rational or algebraic numbers. In application areas such as engineering and the natural sciences, it may be unrealistic to assume that the system under consideration is known to perfect accuracy. Rather, one should assume that the system is known only up to some (presumably small) error with respect to a given distance function. In this context, one is arguably less interested in deciding the problem for a single given instance, but to exhibit a neighbourhood of the given instance for which the answer to the problem remains constant – provided that such a neighbourhood exists. If the given instance lies on a “decision boundary”, i.e., the answer to the problem is sensitive to arbitrarily small perturbations of the instance, not much appears to be gained by solving the problem for that specific instance. In some sense, this can also be viewed as an opportunity to increase the scope of automated decision methods, since the aforementioned undecidability results usually occur due to instances that lie on such decision boundaries.
This has led to various problems of this type being studied in various, generally non-equivalent, formalisations of “robust decidability” [25, 2, 38, 14, 3].
The aim of this paper is to demonstrate by means of a case study that computable analysis constitutes a very suitable framework for the study of robust decidability questions. Computable analysis is the study of computation on data that is not specified by a complete finite description, but rather given as an infinite sequence of increasingly accurate approximations. For example, a real number can be encoded by an infinite sequence of nested intervals with rational endpoints such that . An algorithm for computing a real number takes as input a non-negative integer and outputs an interval with rational endpoints. The algorithm is required to ensure that the sequence is nested and satisfies . An algorithm for computing a real function takes as input an infinite sequence of intervals which is guaranteed to encode a real number , and returns as output an infinite sequence of intervals . The algorithm is required to ensure that for all input sequences encoding a real number , the output sequence encodes the real number . The infinite sequence is presented to the algorithm as a “black box”: the algorithm can query the black box for any integer to receive the interval . Formally, this idea can be realised by using oracle Turing machines with an “input oracle” [22] or, equivalently, by using Turing machines with an infinite read-only tape that contains the entire infinite input sequence [44]. It is important to observe that in the definition above, an algorithm for computing a real function operates on all real numbers, not just on computable ones. This should be contrasted with Markov computability [23, 18], where algorithms operate only on computable objects which are presented as indexes of Turing machines that compute the objects.
One may object that the above model of computation is still unrealistic: Our initial motivation – to study systems that are not known exactly – suggests to consider decision methods for objects that are known only to some fixed finite precision. While in computable analysis objects are not given by an infinitely precise finite description, they can still be approximated to arbitrary, rather than fixed, finite precision. However, an algorithm that computes a function from one space to another can be automatically lifted to one that computes the range of the function over any given compact subset of the space [32, Proposition 11], automatically yielding an effective method for operating on objects that are known only to some fixed precision. See also [25, Section 2] for a discussion of this in the context of decision problems.
We study the following very general instantiation of the decision problem mentioned above: Given a continuous function , a closed set , and a point , determine whether the point escapes under iteration of . To make this precise, we introduce standard encodings of points, sets, and functions, which we discuss in detail in Section 2.3. Here, the point escapes if and only if there exists such that – i.e., the point is said to escape if it leaves the set after some number of function applications, even if it re-enters the set after further applications of . We will refer to this problem as the Point Escape Problem.
Since the inputs to an algorithm are given as infinite sequences of increasingly accurate approximations, there is no hope to obtain a correct algorithm that halts on every input for any non-trivial problem of the above type: every computable function must be continuous, and every continuous function from a connected space to a two-point space is constant. Since no total algorithm exists for deciding the problem in question, the next best alternative is to ask for a partial algorithm that halts on as many problem instances as possible. Accordingly, we will call a partial algorithm for deciding a problem complete if its halting set contains the halting set of all correct partial algorithms deciding the same problem. This is equivalent to asking that the algorithm halt on all problem instances whose answer is stable under small perturbations. See Section 2.2 for a more formal discussion and [25, Proposition 2.1] for a proof of this equivalence. Observe that for discrete spaces such as the natural numbers, an algorithm is complete in this sense if and only if it halts on all inputs, so that the above definition of completeness is a generalisation of the usual definition in classical computability.
Our algorithm for solving the Point Escape Problem is rather straightforward: We keep track of an overapproximation of a finite initial segment of the orbit, as well as of overapproximations of the individual points in the orbit. If we witness that is separated from the closed set , then we conclude that escapes under . If we witness that is included in the interior of and we can find an overapproximation of the image with , then we conclude that the point must be trapped. If the overapproximations we have computed do not allow us to draw either conclusion, we compute more accurate overapproximations to longer initial segments of the orbit, until we are able to make a decision.
Our main contribution is to show that this simple algorithm is complete in the above sense. The key idea is to show that the search for an invariant set for is guaranteed to terminate provided that has a robust invariant whose interior contains . A compact set is called a robust invariant for if , where denotes the interior of . We show that if is trapped but is not contained in a robust invariant, then escapes under arbitrarily small perturbations of and .
We will further show that if is trapped but is not contained in a robust invariant and , then escapes under arbitrarily small perturbations of alone, with being fixed. This implies that our algorithm, which takes and as inputs, is complete for all fixed and , when only the function is given as an input. Thus, a bespoke algorithm for fixed special sets or initial points, say or will not halt on more functions than our general algorithm.
Since a complete algorithm is only required to halt on robust instances, one is lead to the problem of determining the “size” of the robust instances. In the worst case, a problem may not have any robust instances at all, so that a complete decision method is given by the algorithm that never halts. We show that the halting set of our algorithm is “large”, in the sense that the algorithm halts on a dense set of inputs and that the set of trapped problem instances is the closure of its interior.
Finally, which problem instances are robust depends on the class of functions and how these functions are represented (by our aforementioned result it surprisingly does not essentially depend on how the sets or initial points are represented). We allow arbitrary continuous functions as inputs, given by the weakest representation that makes function evaluation uniformly computable.
In general, if the problem is restricted to a smaller class of functions, potentially with a representation that induces a stronger topology, then previously non-robust instances may become robust, so that our algorithm will in general fail to be complete for restrictions of the Point Escape Problem to smaller function classes.
Indeed, The topology induced by our representation of continuous functions is the topology of uniform convergence on compact sets. In this topology, every neighbourhood of a function contains functions that agree with on some compact set, but differ arbitrarily from outside this compact set. For this reason, our algorithm will fail to halt on very simple-looking problem instances where the given set is unbounded. Consider for example the problem instance consisting of the set , the function , and the initial point . Since does not map any compact set into its interior, our algorithm will fail to halt on this problem instance.
However, we will show that systems such as the above can be effectively treated by our algorithm after first applying a suitable compactification. More specifically, we show that the problem of deciding whether a point escapes a polyhedron (which is in general unbounded) under an affine linear map reduces to the Point Escape Problem for continuous functions in such a way that robust problem instances get mapped to robust problem instances. We conjecture that this reduction extends to more general non-linear systems that are sufficiently well behaved “at infinity”.
To discuss the applicability of our algorithm to a class of much more rigid non-linear systems, we consider the problem of deciding whether the origin in the complex plane has an unbounded orbit under a quadratic polynomial, represented by a single complex parameter. The existence of a complete algorithm for this problem is closely related to the computability of the Mandelbrot set [17]. We give a reduction of this problem to the Point Escape Problem that maps robust instances to robust instances if and only if the hyperbolicity conjecture holds true.
The rest of the paper is structured as follows: in Section 2 we review the relevant background material from computable analysis, discuss completeness of decision methods over continuous data, and formally introduce our representations of points, sets, and functions. Section 3 contains a formal description of our main algorithm and our main results: that the algorithm is correct, complete, and generically terminating. In Sections 4 and 5 we describe our applications to linear and quadratic systems respectively.
2 Preliminaries
2.1 Computable Analysis
We review some basic definitions and results from computable analysis. Good introductions to the subject are given in [44, 11, 22, 12, 32]. The key idea for computing with first-order objects such as real numbers and real functions is to encode them via integer sequences. Let denote the space of all sequences of non-negative integers. We make into a topological space by endowing it with the product topology, which is generated by the distance function . A sequence is called computable if there exists a Turing machine which takes as input a natural number and returns as output the natural number .
An oracle Turing machine computes a partial function if for all oracles with and all natural numbers , the machine halts in finite time on input with oracle and outputs the number , where . Observe that the oracle is not a fixed function, but part of the input. Further, observe that we do not constrain the machine’s behaviour for oracle-inputs outside the domain of . A partial function is called computable if it is computed by some Turing machine.
A represented space is a set together with a partial surjective map . We will usually write just for the represented space when is implicit or inferable from the context. Let be a represented space, and let . A point is called a name of if and . The point is called computable if it has a computable name.
Let be a function between represented spaces. A partial function is called a realiser of if and . The function is called computable if it has a computable realiser. It is called continuous if it has a continuous realiser (with respect to the relative topology induced by the product topology on ).
If is a set and and are representations, we say that and are computably equivalent or just equivalent if the identity on is computable as a map and as a map between represented spaces. By replacing “computable” with “continuous” in the above definition, we obtain the definition of topological equivalence.
Any representation induces a topology on , namely the final topology, where is open if and only if is an open subset of (with respect to the relative topology induced by the product topology on ). We will call this topology the topology of the represented space . For a function between represented spaces, we have two a priori distinct notions of continuity available: continuity in the sense of having a continuous realiser, and topological continuity in the sense of being continuous with respect to the topologies on and . Any continuous function is topologically continuous, but the converse is false in general. A representation is called admissible if all topologically continuous functions , where is a represented space, are continuous (cf. [32, Theorem 36]). All representations we consider in this paper will be admissible. Beyond this, we will only consider representations that are open maps, i.e. representations where every prefix of a name defines an open subset of the represented space. Intuitively, this means that all names contain the same amount of information.
2.2 Complete Decision Methods
An algorithm over discrete data is called complete if it halts on all inputs. A set is said to be decidable if there exists a complete algorithm that correctly determines whether a given input belongs to the set. If we apply the same definition to continuous data, we often end up with a trivial notion: if is a represented space such as or whose associated topology is connected, then the only decidable subsets of in in the above sense are the empty set and itself, for a decision method defines a computable function of type and this function must be continuous.
To obtain a more meaningful notion, the definition of “complete algorithm” must be extended in a different way. Let be a represented space. Let . A (partial) decision method for is an algorithm that takes as input the name of a point and either runs forever or halts in finite time. Upon halting, the algorithm is required to output the integer if and the integer if . The halting set of a decision method is the set of all such that the algorithm halts on all names of (for open representations, a decision method that halts on some name of automatically extends to a decision method that halts on all names of ). Letting denote the boundary of , it is easy to see that the halting set of a decision method is contained in . A decision method for is complete if its halting set is equal to . A subset which admits a complete decision method is called maximally partially decidable or simply decidable. Observe that for any space which carries the discrete topology, such as , any subset of has empty boundary, so that our definition of decidability agrees with the usual definition. For spaces such as , this definition of “decidability” yields a considerably richer structure than the trivial one induced by the naïve direct generalisation. For the spaces we are interested in, completeness can be characterised as a kind of optimality: If admits an open representation, then a decision method for is complete if and only if its halting set contains the halting set of every decision method for . This definition is further discussed and motivated in [25].
We will call a problem instance a robust instance if , and a boundary instance otherwise. Thus, an algorithm is complete if and only if it halts on all robust instances. Observe that if we witness an algorithm halting on a given problem instance , then we can identify a prefix of the given name of such that the algorithm halts on all names that extend . When the representation of is open, this prefix corresponds to an open neighbourhood of where the answer to the problem is constant.
2.3 Encoding Points, Sets, and Functions
We describe representations of points in , continuous functions , and closed and compact subsets of . Our representations of points and functions are up to equivalence the usual standard representations of computable analysis that can be found in the literature [44]. Our representations of sets are equivalent to a join of certain standard representations.
Before we introduce our representations, let us introduce some standard notation and terminology. Throughout, we will work with the supremum norm and its induced metric on . For and , we let and denote the open and closed ball of radius about respectively. In , the closed ball of radius about is the closure of the open ball of radius about . For a set , we let and Observe that is always an open set, while is not necessarily a closed set. In particular, is not necessarily equal to the closure of . This is the case, however, if the set is closed. For a proof, see [26, Proposition 23].
For continuous maps we let For a compact set let The set is allowed to be empty in this definition. We define a distance function on the space of all continuous maps by
| (1) |
We choose this metric since its induced topology is the same as the topology induced by the weakest representation of the space of continuous functions that renders evaluation computable – see Proposition 2.3.
In order to formulate our main algorithm, it will be convenient to work with subdivisions of into dyadic rational cubes of uniform size. To facilitate this, we choose representations based on such subdivisions.
Let denote the set of all -dimensional dyadic rational cubes of side-length . The sets subdivide into a cubical mesh of mesh-width , with the interiors of distinct cubes being disjoint. Let .
For a subset of , we write . For a set , we write For sets and , we write to indicate that is a finite subset of .
For a set , we let denote its diameter. We write for the interior of , for the closure of , and for the boundary of . For sets , we write if . It is clear that for finite subsets , of the relations and are decidable.
We will now introduce our representations of points, sets, and functions. Elements of and finite sets of elements of can be coded by natural numbers. We will fix appropriate encodings, without making them explicit.
Definition 1.
Define a representation as follows:
Up to coding, a -name of a point is a sequence of finite sets satisfying for all , for all , and as .
Proposition 2.
The representation is open and admissible and induces the standard Euclidean topology on , i.e., the topology generated by the norm .
Proof.
See [26, Proposition 26].
A code of a multi-valued function with finite values is an integer that encodes a list of the form where the sequence contains every element of the finite set exactly once, and for all we have . Such a list encodes the function that sends the cube to the finite set .
Definition 3.
Define a representation as follows:
Up to coding, a -name of a continuous function is a sequence of set-valued maps with finite values satisfying the following requirements:
-
1.
for all .
-
2.
If and with , then .
-
3.
If , , is a sequence of cubes with , , and as , then as .
Proposition 4.
The representation is open and admissible and induces the compact-open topology on . This topology further coincides with the topology induced by the metric (1).
Proof.
See [26, Proposition 27].
For a set-valued function and a set , we write .
The encoding of continuous functions makes function evaluation on points uniformly computable: if is a name of a point and is a name of a function then is a name of the point – potentially up to shifting the sequence to make defined on for all . Further, if is any representation of that renders evaluation computable, then there exists an algorithm which translates a -name of to a name of with respect to the above representation. For a proof see [44, 39].
Continuous functions on compact sets are uniformly continuous. It is a folklore result in computable analysis that this fact is effectively witnessed by the above encodings (cf. also [22, Theorem 2.24]):
Lemma 5.
Let be a continuous function. Let be a compact set. Then for all there exists such that for all we have .
Proof.
By definition, for all there exists with . By monotonicity, if , then .
By compactness of , the cover must have a finite subcover Now, there exists a number such that every is contained in some with . The claim follows.
A closed set will be represented by a sequence of lists of cubes that exhaust its complement, together with a sequence of lists of cubes that exhaust its interior.
Definition 6.
Define a representation of the set of closed subsets of as follows: Up to coding, a -name of a closed set is a sequence of pairs of finite sets , satisfying the following properties:
-
1.
for all .
-
2.
.
-
3.
for all .
-
4.
.
-
5.
If and with , then .
-
6.
If and with , then .
Proposition 7.
The representation is open and admissible.
Proof.
See [26, Proposition 28].
Observe that if is a name of a point and if is a name of a closed set , then if and only if for all large we have and if and only if for all large we have .
This property extends to arbitrary compact sets: If is a name of a closed set, and is a compact set which is contained in or , then this containment is witnessed by a finite initial segment of the name .
Proposition 8.
Let be a compact set. Let be a name of a closed set . Then if and only if for all large , the set is contained in . We have if and only if for all large , the set is contained in .
Proof.
We show the claim for . The second claim is proved analogously. If for some then by definition. Now, assume that . Since for all , it suffices to show that there exists such that . We have Since is compact, the open cover on the right-hand side must have a finite subcover. The claim follows.
3 The Point Escape Problem
We will now present our algorithm for maximally partially deciding whether a point escapes a closed set under the iteration of a continuous function. More precisely, we consider the following decision problem:
Definition 9.
The Point Escape Problem asks to decide for a given , a continuous function , given via a -name, a closed set , given via an -name, and a given point , given via a -name, whether there exists a natural number with .
An instance of the Point Escape Problem where for some is called an escaping instance. An instance where for all is called a trapped instance.
Algorithm 1 above takes as input a name of a continuous function , a name of a closed set , and a name of a point . It either runs forever or halts within finitely many steps. Upon halting, it reports whether there exists such that . The algorithm proceeds in stages, working on a subdivision of into cubes of side-length in each stage. The stages are described in Algorithm 2. At each stage, Algorithm 2 computes an overapproximation of the orbit of to determine whether escapes. At the same time, it searches for an invariant set under which is contained in , yielding an invariant set under which is contained in .
It is straightforward to verify that Algorithm 1 is correct, i.e., that it produces the correct answer upon halting.
Proposition 10.
Let be a closed set, let be a continuous function, and let be a point. Let , , and be names of , , and respectively. Assume that Algorithm 1 is given the inputs , , and .
If the algorithm eventually halts, it correctly reports whether is trapped or whether it escapes.
Proof.
See [26, Proposition 10].
3.1 Completeness
We will now show that our algorithm is complete, i.e. that it halts on all problem instances for which the answer is robust under small perturbations.
It is easy to see that the algorithm halts on all problem instances where the point escapes. We will show that if the point is trapped, termination of the algorithm is guaranteed by the existence of a robust invariant. Conversely, the absence of a robust invariant entails that the point escapes under arbitrarily small perturbations of the function.
Definition 11.
Let be a continuous function. A robust invariant for is a compact set such that .
We first observe the following sufficient conditions for termination:
Proposition 12.
Let be a closed set, let be a continuous function, and let be a point. Let , , and be names of , , and respectively. Assume that Algorithm 1 is given the inputs , , and .
-
1.
If escapes under , then the algorithm eventually halts.
-
2.
If is contained in the interior of a robust invariant for with , then the algorithm eventually halts.
Proof.
See [26, Proposition 12].
The core of the completeness proof is the following
Lemma 13.
Let be a continuous map. Let be a compact set. Let .
Assume that is not contained in the interior of any robust invariant of in . Then for all there exists a map with such that escapes under .
Proof Sketch.
We will only sketch the proof idea. The full proof is given in [26, Appendix B].
Let . Consider the set Since is compact and is continuous, there exists such that and such that , implies .
Consider the compact set . Then by construction, and is contained in the interior of the complement of . By assumption, cannot be a robust invariant of . Hence, the set must be non-empty. If , we can repeat the same argument, applied to to obtain the non-empty closed set
Proceeding by induction, we obtain a sequence of non-empty closed subsets of such that is disjoint from and for we have if and only if . A straightforward compactness argument shows that the sequence must be finite, so that there exist with and for .
Now, since is -close to an element of , which gets mapped -close to some element of under , we can modify on a small neighbourhood of such that gets mapped to a point . We then proceed to modify on a small neighbourhood of to ensure that maps to a point . By induction, we obtain a sequence of points and a perturbation of by at most , such that and .
Lemma 3.1 applies only to compact sets. It admits the following extension to arbitrary closed sets:
Lemma 14.
Let , let be a closed set, and let .
If there is no robust invariant for with , then there exist sequences and with and such that and escapes under .
Further, if , then we may take for all .
Proof.
See [26, Lemma 14].
Theorem 15.
Let be a closed set, let be a continuous function, and let be a point. Let , , and be names of , , and respectively. Assume that Algorithm 1 is given the inputs , , and .
-
1.
If the algorithm eventually halts, it correctly reports whether is trapped or whether it escapes.
-
2.
If escapes under , then the algorithm eventually halts.
-
3.
If is contained in the interior of a robust invariant of with , then the algorithm eventually halts.
-
4.
If the algorithm does not halt, then there exist sequences , , with for and , such that escapes under and is trapped in under for all . Moreover, if , then we can choose for all .
In particular, Algorithm 1 is a complete decision method for the Point Escape Problem.
Theorem 15 establishes more than just the completeness of the algorithm: if is not equal to all of and the algorithm fails to halt on a problem instance , then the answer to the problem is unstable under small perturbations of the function alone. This implies that Algorithm 1 yields a complete decision method for the Special Point Escape Problem where and are fixed, and only is given as an input. Of course, this result does not extend to the case where since every point is robustly trapped in , but not every function has a robust invariant.
3.2 Generic Termination
A complete algorithm for a decision problem need not be able to solve the problem on a “large” set of instances. For example, the set is maximally partially decided by the algorithm that never halts. Given a complete algorithm, one is thus led to the problem of characterising the “size” of its halting set.
All escaping instances of the Point Escape Problem are robustly escaping – in particular, Algorithm 1 halts on a dense set of inputs – which means that for every input there exists a sequence of inputs with , , such that the algorithm halts on input for all . Convergence is with respect to the final topology induced by the representation. It is of course not the case that all trapped instances are robustly trapped. However, we will show that the robustly trapped instances are typical among the trapped ones: every boundary instance (i.e. every trapped instance that is not robustly trapped) can be perturbed into a robustly trapped instance under arbitrarily small perturbations. In this sense, both the robustly escaping instances and the robustly trapped instances constitute “large” sets.
Lemma 16.
Let be a boundary instance of the Point Escape Problem, where is a compact set. Then there exist sequences and with , such that is a robust trapped instance of the Point Escape Problem for all .
Proof Sketch..
Since Algorithm 1 halts on all escaping instances, the instance must be trapped.
Let . Consider the compact set . Then the orbit is contained in the interior of .
By compactness, admits a cover of the form with . The orbit is contained in , so that, by the pigeonhole principle, there exist minimal such that and are contained in the same ball . The points are uniformly bounded away from the boundary of by some . We may further assume that the balls are disjoint for and that is so small that implies . For we replace on by the constant function with value . On , we replace by the constant function with value . To make the function continuous again, we use the annuli to connect with the modified function via linear interpolation. Then the set is a robust invariant for the perturbed function which is contained in the interior of and contains in its interior. From this, we easily obtain a robust invariant in the interior of that contains in its interior.
The full proof is given in [26, Appendix C].
Corollary 17.
Let be a boundary instance of the Point Escape Problem. Then there exist sequences and with , such that is a robust trapped instance of the Point Escape Problem for all .
Proof.
The instance must be a trapped instance of the Point Escape Problem. We show that there exists a sequence of functions and a sequence of compact sets with and such that is a (not necessarily robust) trapped instance of the Point Escape Problem. Together with Lemma 3.2 this yields the claim.
We distinguish two cases: If the orbit of under is bounded, say, contained in the ball for some , we let and for all . It is clear that is trapped in under for all . It is easy to see that in the topology induced by our representation of closed sets.
Now assume that the orbit of under is unbounded.
Fix some .
Let .
Let .
Let be the smallest index such that are contained in , but
.
Let .
Let .
Let
Observe that by construction we have , so that the orbit of under is equal to .
It is easy to see (for example by using Proposition 2.3) that in the topology induced by our representation of functions and that in the topology induced by our representation of closed sets.
4 Linear Systems
As mentioned in the introduction, Algorithm 1 may fail to terminate on very simple-looking problem instances when is not a compact set. The main reason for this is that our representation of continuous functions induces the topology of uniform convergence on compact sets, or equivalently, the topology induced by the metric (1). In order for two functions to have distance at most , it suffices that and agree on the cube , potentially admitting function values of arbitrarily large distance outside of this cube. Thus, every function has “arbitrarily small” perturbations that differ from arbitrarily outside a certain bounded set.
Revisiting the example from the introduction, consider the set , the initial point , and the map , . It is clear that the point is trapped in under iteration of . However, it cannot be robustly trapped, since does not admit any robust invariants. More explicitly, with respect to the metric (1), is the limit of the sequence
We have and , so that escapes under each .
While a naïve direct application of Algorithm 1 fails to verify that the system is trapped, we can exploit the fact that the particular and given above are well behaved “near infinity” to compute a compactified version of the system that is amenable to analysis via Algorithm 1.
Consider the map . This map has a continuous inverse, explicitly given by . We have . The expression on the right-hand side of this equality defines a total function . Observe that a point is trapped in under if and only if is trapped in under . The latter can be verified by Algorithm 1 for all , since admits the robust invariant with .
To further illustrate how the scope of Algorithm 1 can be extended using this compactification technique, we generalise the above observation to give a solution for the problem of deciding whether a point escapes a polyhedron (which is in general unbounded) under the iteration of an affine linear map:
Definition 18.
The Linear Escape Problem asks to determine for a given non-singular matrix , a given vector , a given polyhedron , and a given point whether escapes under the map .
Here, is given by a -name of its entries, and is given by a finite list of affine half-spaces with , where each is given by a -name of a normal and a -name of a distance , such that .
We will give a reduction of the Linear Escape Problem to the Point Escape Problem that sends robust instances to robust instances based on the compactification idea discussed above.
Before we describe the reduction, we classify the robust instances of the Linear Escape Problem. Since all escaping instances are robust, we focus only on trapped instances.
For a matrix , let denote the set of its eigenvalues and denote the largest value among the absolute values of its eigenvalues.
For a polyhedron with , we let , where .
Lemma 19.
Let be a trapped instance of the Linear Escape Problem. Then is robust if and only if the orbit is contained in the interior of and one of the three following conditions is met:
-
1.
and the unique fixed point of the map is contained in .
-
2.
has a simple real eigenvalue with for all other eigenvalues and there exists an eigenvector for with and where and is a linear combination of eigenvalues and generalised eigenvalues for eigenvalues (in the sense of the real Jordan normal form).
-
3.
has the simple real eigenvalue with for all other eigenvalues, there exists an eigenvector for with such that , , where , and and are linear combinations of eigenvalues and generalised eigenvalues for eigenvalues (in the sense of the real Jordan normal form).
Proof.
The proof is very similar to that of [25, Proposition 5.1, Proposition 6.2.]. It is given in [26, Appendix D].
We now describe the reduction to the Point Escape Problem.
Consider the continuous map This map is invertible with inverse The map extends (uniformly computably) to the continuous map
For a polyhedron with , we define , where . Observe that .
Proposition 20.
The point is trapped in under if and only if the point is trapped in under .
Proof.
Since is bijective we have if and only if . On , the map agrees with , which maps to . It follows that we have , which yields the claim.
We now obtain our desired reduction:
Proposition 21.
The instance is a robust instance of the Linear Point Escape Problem if and only if the instance is a robust instance of the Point Escape Problem.
Proof.
If the instance escapes, the claim is obvious. Thus, assume that the instance is trapped. We show that has a robust invariant in the interior of .
Consider the classification of robust instances given in Lemma 4.
In the first case, it follows from the proof of Lemma 4 that the point is a fixed point of such that every point in converges to under the iteration of . Moreover, for a sufficiently small and sufficiently large , the ball is mapped by inside the ball .
In the second and third case, it follows from the proof of Lemma 4 that the point is a fixed point of with as . Moreover, for a sufficiently small and sufficiently large , the ball is mapped by inside the ball .
In either case, for sufficiently small , the ball is a robust invariant of for some which is contained in the interior of , such that all remain in the interior of under iteration of , for some , and for all .
5 The Quadratic Family
As a final application of Algorithm 1, we provide a complete decision method for the Mandelbrot set subject to the hyperbolicity conjecture. The Mandelbrot set is the set of all parameters such that the orbit of the origin under the map is bounded. The Mandelbrot set is a compact connected subset of . Despite being best known for its numerous computer-generated depictions [33], it is unknown whether there exists any rigorous algorithm for computing accurate images of to a given resolution. See [13] for a good discussion of this. This has lead Penrose [34] to go as far as conjecturing that the Mandelbrot set might be an uncomputable subset of , however without specifying a computational model. Shortly after Penrose made his conjecture, Blum and Smale [8] showed that the Mandelbrot set is undecidable in the BSS-model of real computation [7]. However, Brattka [10] soon raised the objection that BSS-decidability does not adequately capture the intuitive notion of computability that Penrose had in mind: In fact, Penrose explicitly mentions the closed epigraph of the exponential function as an example of an intuitively computable subset of the complex plane. However, all BSS-decidable subsets of must be semi-algebraic, so that the epigraph of the exponential function is BSS-undecidable. Computable analysis offers an alternative definition of computability: a subset of the complex plane is called computable if its distance function is computable. It is quite easy to see that the distance function of a compact set is computable if and only if the set can be plotted at any given resolution – see for example [13] for details.
Hertling [17] showed that is computable in this sense subject to the hyperbolicity conjecture, which we describe below. He even showed that under this conjecture the signed distance function is computable. This is stronger than computability, as there exist sets whose distance function is computable but whose signed distance function is not. It follows from Hertling’s work that the signed distance function of is computable if and only if is maximally partially decidable.
The problem of maximally partially deciding the Mandelbrot set reduces to the Point Escape Problem as follows: map to the Point Escape Problem instance , where . Observe that .
We will discuss how much of the Mandelbrot set our algorithm for the Point Escape Problem is able to compute under this reduction. To state our main result we require one more definition. A point in the interior of is called hyperbolic if has an attracting cycle, i.e. there exist and with , for , and .
The hyperbolicity conjecture states that every point in the interior of is hyperbolic. We obtain the following result:
Theorem 22.
The decision problem for the Mandelbrot set reduces to the General Escape Problem via the reduction above. This reduction maps a parameter to a robust instance of the General Escape Problem if and only if belongs to or to a hyperbolic component of the interior of . In particular, the reduction maps robust instances to robust instances if and only if the hyperbolicity conjecture holds true.
Proof.
Consider the map defined above. It is easy to see that this is really a reduction. It is obvious that – under this reduction – Algorithm 1 halts on all parameters outside and that Algorithm 1 does not halt on any boundary point.
Now, let . Assume first that is hyperbolic. Then has an attracting cycle as described above. A celebrated theorem by Fatou [9, Theorem 1] asserts that the origin is attracted by this attracting cycle, i.e. for all there exists such that .
We show that the attracting cycle induces a robust invariant. Since , there exists such that . Further, observe that by the chain rule we have for all . By continuity, there exists a number such that for all with for some . Consider the set It follows from the uniform bound on the first derivative that on , the function is Lipschitz-continuous with Lipschitz constant . Let with . Then we obtain:
So is a robust invariant for . Since is attracted by the attracting cycle, we have for sufficiently large .
It now follows from [26, Proposition 31, Proposition 32] that there exists a robust invariant for whose interior contains . This invariant must be contained in the closed disk of radius , for any orbit of that contains an element of absolute value greater than must be unbounded. In particular, it must be contained in the open disk of radius . Hence, Algorithm 1 halts on input .
Suppose on the other hand that belongs to a non-hyperbolic component of the interior of . Let denote the filled-in Julia set of . It can be shown (see [15]) that since belongs to a non-hyperbolic component of the interior of , we must have . This implies that for all there exists with and . Since the orbit is unbounded and disjoint from with , there exists a number with . Thus, if we define to be equal to if and to otherwise be defined by , then the orbit of under is unbounded, and . This shows that Algorithm 1 cannot halt on input .
6 Conclusion and Future Work
We have studied the problem of deciding for a given set, initial point, and function whether the initial point escapes the set under iteration of the function. We have allowed arbitrary continuous functions as inputs, represented by the weakest representation that makes function evaluation uniformly computable. We have given an algorithm that certifies that the initial point is trapped by searching for a robust invariant. We have shown that this algorithm is complete in the sense that no sound algorithm can detect further trapped instances. This settles the very natural question of how much is decidable about the escape problem when we are given just enough information about our system to compute the orbit of a given point. In general, computable analysis allows us to ask and answer questions of this form: if we are given a certain (limited) amount of information about a system, how much can we say about the system’s behaviour? This leads to various natural directions for future work: On the one hand, it would be very interesting to study more general systems, for example by replacing with a locally compact metric space . On the other hand, it would be interesting to study more special systems which are presented with additional information, such as polynomials or other subclasses of analytic maps which are “well-behaved at infinity” such as Pfaffian functions. We have provided partial evidence that, somewhat surprisingly, our algorithm for general systems yields maximal partial algorithms for rather rigid special systems, such as linear systems and – conjecturally – one-dimensional complex quadratic systems. It would be very interesting to determine whether this reduction extends, for example, to higher-degree multivariate polynomials.
References
- [1] Manindra Agrawal, S. Akshay, Blaise Genest, and P.S. Thiagarajan. Approximate Verification of the Symbolic Dynamics of Markov Chains. In 2012 27th Annual IEEE Symposium on Logic in Computer Science, pages 55–64, 2012. doi:10.1109/LICS.2012.17.
- [2] S. Akshay, Hugo Bazille, Blaise Genest, and Mihir Vahanwala. On Robustness for the Skolem and Positivity Problems. In Petra Berenbrink and Benjamin Monmege, editors, 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022, March 15-18, 2022, Marseille, France (Virtual Conference), volume 219 of LIPIcs, pages 5:1–5:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPIcs.STACS.2022.5.
- [3] Christel Baier, Florian Funke, Simon Jantsch, Toghrul Karimov, Engel Lefaucheux, Joël Ouaknine, Amaury Pouly, David Purser, and Markus A. Whiteland. Reachability in Dynamical Systems with Rounding. In Nitin Saxena and Sunil Simon, editors, 40th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2020, December 14-18, 2020, BITS Pilani, K K Birla Goa Campus, Goa, India (Virtual Conference), volume 182 of LIPIcs, pages 36:1–36:17. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPIcs.FSTTCS.2020.36.
- [4] William J. Baumol. Economic Dynamics. Prentice Hall, 1970.
- [5] Jason P. Bell and Stefan Gerhold. On the positivity set of a linear recurrence. Israel Journal of Mathematics, 157:333–345, 2007. doi:10.1007/s11856-006-0015-1.
- [6] Vincent D. Blondel, Emmanuel Jeandel, Pascal Koiran, and Natacha Portier. Decidable and Undecidable Problems about Quantum Automata. SIAM Journal on Computing, 34(6):1464–1473, 2005. doi:10.1137/S0097539703425861.
- [7] Lenore Blum, Felipe Cucker, Michael Shub, and Steve Smale. Complexity and Real Computation. Springer, 1998.
- [8] Lenore Blum and Steve Smale. The Gödel Incompleteness Theorem and Decidability over a Ring. In Morris W. Hirsch, Jerrold E. Marsden, and Michael Shub, editors, From Topology to Computation: Proceedings of the Smalefest, pages 321–339, New York, NY, 1993. Springer US. doi:10.1007/978-1-4612-2740-3_32.
- [9] Bodil Branner. The Mandelbrot Set. In Robert L. Devaney and Linda Keen, editors, Chaos and Fractals: The Mathematics Behind the Computer Graphics, pages 75–106. American Mathematical Society, 1989.
- [10] Vasco Brattka. The emperor’s new recursiveness: The epigraph of the exponential function in two models of computability. In Masami Ito and Teruo Imaoka, editors, Words, Languages & Combinatorics III, pages 63–72, 2003.
- [11] Vasco Brattka and Peter Hertling, editors. Handbook of Computability and Complexity in Analysis, Theory and Applications of Computability, Cham, 2021. Springer. doi:10.1007/978-3-030-59234-9.
- [12] Vasco Brattka and Gero Presser. Computability on subsets of metric spaces. Theoretical Computer Science, 305(1 – 3):43–76, 2003. doi:10.1016/S0304-3975(02)00693-X.
- [13] Mark Braverman and Michael Yampolsky. Computability of Julia Sets. Springer, 2009.
- [14] Julian D’Costa, Toghrul Karimov, Rupak Majumdar, Joël Ouaknine, Mahmoud Salamati, Sadegh Soudjani, and James Worrell. The Pseudo-Skolem Problem is Decidable. In Filippo Bonchi and Simon J. Puglisi, editors, 46th International Symposium on Mathematical Foundations of Computer Science, MFCS 2021, August 23-27, 2021, Tallinn, Estonia, volume 202 of LIPIcs, pages 34:1–34:21. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPIcs.MFCS.2021.34.
- [15] Adrien Douady and John H. Hubbard. Étude dynamique des polynômes complexes. Publications mathématiques d’Orsay, 1984.
- [16] Stefan Gerhold and Manuel Kauers. A procedure for proving special function inequalities involving a discrete parameter. In Manuel Kauers, editor, Symbolic and Algebraic Computation, International Symposium ISSAC 2005, Beijing, China, July 24-27, 2005, Proceedings, pages 156–162. ACM, 2005. doi:10.1145/1073884.1073907.
- [17] Peter Hertling. Is the Mandelbrot set computable? Mathematical Logic Quarterly, 51(1):5–18, 2005. doi:10.1002/malq.200310124.
- [18] Mathieu Hoyrup and Cristóbal Rojas. On the Information Carried by Programs About the Objects they Compute. Theor. Comp. Sys., 61(4):1214–1236, November 2017. doi:10.1007/s00224-016-9726-9.
- [19] Manuel Kauers and Veronika Pillwein. When can we detect that a P-finite sequence is positive? In Wolfram Koepf, editor, Symbolic and Algebraic Computation, International Symposium, ISSAC 2010, Munich, Germany, July 25-28, 2010, Proceedings, pages 195–201. ACM, 2010. doi:10.1145/1837934.1837974.
- [20] George Kenison. The Threshold Problem for Hypergeometric Sequences with Quadratic Parameters. In Karl Bringmann, Martin Grohe, Gabriele Puppis, and Ola Svensson, editors, 51st International Colloquium on Automata, Languages, and Programming (ICALP 2024), volume 297 of Leibniz International Proceedings in Informatics (LIPIcs), pages 145:1–145:20, Dagstuhl, Germany, 2024. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ICALP.2024.145.
- [21] George Kenison, Oleksiy Klurman, Engel Lefaucheux, Florian Luca, Pieter Moree, Joël Ouaknine, Markus A. Whiteland, and James Worrell. On Positivity and Minimality for Second-Order Holonomic Sequences. CoRR, abs/2007.12282, 2020. arXiv:2007.12282.
- [22] Ker-I Ko. Complexity theory of real functions. Progress in Theoretical Computer Science. Birkhäuser Boston, Inc., Boston, MA, 1991. doi:10.1007/978-1-4684-6802-1.
- [23] Boris A. Kushner. Markov’s constructive analysis; a participant’s view. Theoretical Computer Science, 219(1):267–285, 1999. doi:10.1016/S0304-3975(98)00291-6.
- [24] Stephen Melczer and Marc Mezzarobba. Sequence positivity through numeric analytic continuation: uniqueness of the Canham model for biomembranes. Comb. Theory, 2(2):Paper No. 4, 20, 2022. doi:10.5070/C62257847.
- [25] Eike Neumann. Decision problems for linear recurrences involving arbitrary real numbers. Logical Methods in Computer Science, Volume 17, Issue 3, August 2021. doi:10.46298/lmcs-17(3:16)2021.
- [26] Eike Neumann. Deciding Robust Instances of an Escape Problem for Dynamical Systems in Euclidean Space, 2025. doi:10.48550/arXiv.2506.21481.
- [27] Eike Neumann, Joël Ouaknine, and James Worrell. Decision Problems for Second-Order Holonomic Recurrences. In Nikhil Bansal, Emanuela Merelli, and James Worrell, editors, 48th International Colloquium on Automata, Languages, and Programming, ICALP 2021, July 12-16, 2021, Glasgow, Scotland (Virtual Conference), volume 198 of LIPIcs, pages 99:1–99:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPIcs.ICALP.2021.99.
- [28] Joël Ouaknine and James Worrell. On the Positivity Problem for Simple Linear Recurrence Sequences. In Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, and Elias Koutsoupias, editors, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II, volume 8573 of Lecture Notes in Computer Science, pages 318–329. Springer, 2014. doi:10.1007/978-3-662-43951-7_27.
- [29] Joël Ouaknine and James Worrell. Positivity Problems for Low-Order Linear Recurrence Sequences. In Chandra Chekuri, editor, Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 366–379. SIAM, 2014. doi:10.1137/1.9781611973402.27.
- [30] Joël Ouaknine and James Worrell. Ultimate Positivity is Decidable for Simple Linear Recurrence Sequences. In Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, and Elias Koutsoupias, editors, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II, volume 8573 of Lecture Notes in Computer Science, pages 330–341. Springer, 2014. doi:10.1007/978-3-662-43951-7_28.
- [31] Joël Ouaknine and James Worrell. On linear recurrence sequences and loop termination. ACM SIGLOG News, 2(2):4–13, 2015. doi:10.1145/2766189.2766191.
- [32] Arno Pauly. On the topological aspects of the theory of represented spaces. Computability, 5(2):159–180, 2016. doi:10.3233/COM-150049.
- [33] Heinz-Otto Peitgen and Peter Richter. The Beauty of Fractals. Springer-Verlag, Heidelberg, 1986.
- [34] Roger Penrose. The Emperor’s New Mind. Oxford University Press, 1989.
- [35] Veronika Pillwein. Positivity of certain sums over Jacobi kernel polynomials. Advances in Applied Mathematics, 41(3), 2008. doi:10.1016/J.AAM.2007.12.001.
- [36] Veronika Pillwein. Termination Conditions for Positivity Proving Procedures. In Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, ISSAC ’13, pages 315–322, New York, NY, USA, 2013. Association for Computing Machinery. doi:10.1145/2465506.2465945.
- [37] Veronika Pillwein and Miriam Schussler. An efficient procedure deciding positivity for a class of holonomic sequences. ACM Communications in Computer Algebra, 49(3):90–93, 2015. Extended abstract of the poster presentation at ISSAC 2015.
- [38] Stefan Ratschan. Safety verification of non-linear hybrid systems is quasi-decidable. Formal Methods in System Design, 44(1):71–90, 2014. doi:10.1007/s10703-013-0196-2.
- [39] Matthias Schröder. Admissible Representations for Continuous Computations. PhD thesis, FernUniversität Hagen, 2002.
- [40] G. Szegö. Über gewisse Potenzreihen mit lauter positiven Koeffizienten. Mathematische Zeitschrift, 37:674–688, 1933. URL: http://eudml.org/doc/168480.
- [41] R. Tijdeman, M. Mignotte, and T.N. Shorey. The distance between terms of an algebraic recurrence sequence. Journal für die reine und angewandte Mathematik, 349:63–76, 1984. URL: http://eudml.org/doc/152622.
- [42] Ashish Tiwari. Termination of Linear Programs. In CAV’04, volume 3114 of LNCS. Springer, 2004. doi:10.1007/978-3-540-27813-9_6.
- [43] N.K. Vereshchagin. Occurrence of zero in a linear recursive sequence. Mat. Zametki, 38(2):177–189, 1985.
- [44] Klaus Weihrauch. Computable Analysis. Springer, 2000.
- [45] Thomas Yu and Jingmin Chen. Uniqueness of Clifford torus with prescribed isoperimetric ratio. Proceedings of the American Mathematical Society, 150, 2022. doi:10.1090/proc/15750.
