Abstract 1 Introduction 2 Preliminaries 3 The Point Escape Problem 4 Linear Systems 5 The Quadratic Family 6 Conclusion and Future Work References

Deciding Robust Instances of an Escape Problem for Dynamical Systems in Euclidean Space

Eike Neumann ORCID Swansea University, UK
Abstract

We study the problem of deciding whether a point escapes a closed subset of d under the iteration of a continuous map f:dd in the bit-model of real computation. We give a sound partial decision method for this problem which is complete in the sense that its halting set contains the halting set of all sound partial decision methods for the problem. Equivalently, our decision method terminates on all problem instances whose answer is robust under all sufficiently small perturbations of the function. We further show that the halting set of our algorithm is dense in the set of all problem instances. While our algorithm applies to general continuous functions, we demonstrate that it also yields complete decision methods for much more rigid function families: affine linear systems and quadratic complex polynomials. In the latter case, completeness is subject to the density of hyperbolicity conjecture in complex dynamics. This in particular yields an alternative proof of Hertling’s (2004) conditional answer to a question raised by Penrose (1989) regarding the computability of the Mandelbrot set.

Keywords and phrases:
Dynamical Systems, Computability in Analysis, Non-Linear Functions
Copyright and License:
[Uncaptioned image] © Eike Neumann; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation
Related Version:
Full Version: https://arxiv.org/abs/2506.21481 [26]
Funding:
This work was supported by Swansea University.
Editors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał Skrzypczak

1 Introduction

A large number of problems in a diverse range of areas, such as program verification [31], numerical analysis [40, 35], economics [4], probabilistic systems [1, 6], and biology [45, 24] reduce to a problem of the following type: Given a set AX, a function f:XX, and a point x0A, decide whether x0 escapes A under finitely many iterations of f.

Unsurprisingly, the study of automated methods for the solution of such problems has received much attention [41, 43, 29, 28, 30, 27, 21, 36, 37, 19, 16, 5, 20].

Existing work on automated decision methods largely focusses on linear systems. In fact, the scope of automated decision methods for non-linear systems appears to be quite limited: the above problem is undecidable [42] already when f:dd is a piecewise linear function and A is a polyhedron in d.

All of the aforementioned results assume that the system is specified exactly, by means of rational or algebraic numbers. In application areas such as engineering and the natural sciences, it may be unrealistic to assume that the system under consideration is known to perfect accuracy. Rather, one should assume that the system is known only up to some (presumably small) error with respect to a given distance function. In this context, one is arguably less interested in deciding the problem for a single given instance, but to exhibit a neighbourhood of the given instance for which the answer to the problem remains constant – provided that such a neighbourhood exists. If the given instance lies on a “decision boundary”, i.e., the answer to the problem is sensitive to arbitrarily small perturbations of the instance, not much appears to be gained by solving the problem for that specific instance. In some sense, this can also be viewed as an opportunity to increase the scope of automated decision methods, since the aforementioned undecidability results usually occur due to instances that lie on such decision boundaries.

This has led to various problems of this type being studied in various, generally non-equivalent, formalisations of “robust decidability” [25, 2, 38, 14, 3].

The aim of this paper is to demonstrate by means of a case study that computable analysis constitutes a very suitable framework for the study of robust decidability questions. Computable analysis is the study of computation on data that is not specified by a complete finite description, but rather given as an infinite sequence of increasingly accurate approximations. For example, a real number x can be encoded by an infinite sequence (In)n of nested intervals with rational endpoints such that {x}=nIn. An algorithm for computing a real number x takes as input a non-negative integer n and outputs an interval In with rational endpoints. The algorithm is required to ensure that the sequence (In)n is nested and satisfies {x}=nIn. An algorithm for computing a real function f: takes as input an infinite sequence of intervals (Im)m which is guaranteed to encode a real number x, and returns as output an infinite sequence of intervals (Jn)n. The algorithm is required to ensure that for all input sequences (Im)m encoding a real number x, the output sequence (Jn)n encodes the real number f(x). The infinite sequence (Im)m is presented to the algorithm as a “black box”: the algorithm can query the black box for any integer m to receive the interval Im. Formally, this idea can be realised by using oracle Turing machines with an “input oracle” [22] or, equivalently, by using Turing machines with an infinite read-only tape that contains the entire infinite input sequence [44]. It is important to observe that in the definition above, an algorithm for computing a real function operates on all real numbers, not just on computable ones. This should be contrasted with Markov computability [23, 18], where algorithms operate only on computable objects which are presented as indexes of Turing machines that compute the objects.

One may object that the above model of computation is still unrealistic: Our initial motivation – to study systems that are not known exactly – suggests to consider decision methods for objects that are known only to some fixed finite precision. While in computable analysis objects are not given by an infinitely precise finite description, they can still be approximated to arbitrary, rather than fixed, finite precision. However, an algorithm that computes a function from one space to another can be automatically lifted to one that computes the range of the function over any given compact subset of the space [32, Proposition 11], automatically yielding an effective method for operating on objects that are known only to some fixed precision. See also [25, Section 2] for a discussion of this in the context of decision problems.

We study the following very general instantiation of the decision problem mentioned above: Given a continuous function f:dd, a closed set Ad, and a point x0A, determine whether the point escapes A under iteration of f. To make this precise, we introduce standard encodings of points, sets, and functions, which we discuss in detail in Section 2.3. Here, the point escapes if and only if there exists n such that fn(x0)Ai.e., the point is said to escape if it leaves the set after some number of function applications, even if it re-enters the set after further applications of f. We will refer to this problem as the Point Escape Problem.

Since the inputs to an algorithm are given as infinite sequences of increasingly accurate approximations, there is no hope to obtain a correct algorithm that halts on every input for any non-trivial problem of the above type: every computable function must be continuous, and every continuous function from a connected space to a two-point space is constant. Since no total algorithm exists for deciding the problem in question, the next best alternative is to ask for a partial algorithm that halts on as many problem instances as possible. Accordingly, we will call a partial algorithm for deciding a problem complete if its halting set contains the halting set of all correct partial algorithms deciding the same problem. This is equivalent to asking that the algorithm halt on all problem instances whose answer is stable under small perturbations. See Section 2.2 for a more formal discussion and [25, Proposition 2.1] for a proof of this equivalence. Observe that for discrete spaces such as the natural numbers, an algorithm is complete in this sense if and only if it halts on all inputs, so that the above definition of completeness is a generalisation of the usual definition in classical computability.

Our algorithm for solving the Point Escape Problem is rather straightforward: We keep track of an overapproximation O of a finite initial segment {x0,f(x0),,fN(x0)} of the orbit, as well as of overapproximations Qi of the individual points {fi(x0)} in the orbit. If we witness that Qi is separated from the closed set A, then we conclude that x0 escapes under f. If we witness that O is included in the interior of A and we can find an overapproximation O of the image f(O) with OO, then we conclude that the point x0 must be trapped. If the overapproximations we have computed do not allow us to draw either conclusion, we compute more accurate overapproximations to longer initial segments of the orbit, until we are able to make a decision.

Our main contribution is to show that this simple algorithm is complete in the above sense. The key idea is to show that the search for an invariant set for f is guaranteed to terminate provided that f has a robust invariant whose interior contains f(x0). A compact set Vd is called a robust invariant for f if f(V)V, where V denotes the interior of V. We show that if x0 is trapped but f(x0) is not contained in a robust invariant, then x0 escapes under arbitrarily small perturbations of f and A.

We will further show that if x0 is trapped but f(x0) is not contained in a robust invariant and Ad, then x0 escapes A under arbitrarily small perturbations of f alone, with A being fixed. This implies that our algorithm, which takes x0 and A as inputs, is complete for all fixed x0 and Ad, when only the function f is given as an input. Thus, a bespoke algorithm for fixed special sets or initial points, say x0=0 or A=[0,1]d will not halt on more functions than our general algorithm.

Since a complete algorithm is only required to halt on robust instances, one is lead to the problem of determining the “size” of the robust instances. In the worst case, a problem may not have any robust instances at all, so that a complete decision method is given by the algorithm that never halts. We show that the halting set of our algorithm is “large”, in the sense that the algorithm halts on a dense set of inputs and that the set of trapped problem instances is the closure of its interior.

Finally, which problem instances are robust depends on the class of functions and how these functions are represented (by our aforementioned result it surprisingly does not essentially depend on how the sets or initial points are represented). We allow arbitrary continuous functions as inputs, given by the weakest representation that makes function evaluation uniformly computable.

In general, if the problem is restricted to a smaller class of functions, potentially with a representation that induces a stronger topology, then previously non-robust instances may become robust, so that our algorithm will in general fail to be complete for restrictions of the Point Escape Problem to smaller function classes.

Indeed, The topology induced by our representation of continuous functions is the topology of uniform convergence on compact sets. In this topology, every neighbourhood of a function f contains functions g that agree with f on some compact set, but differ arbitrarily from f outside this compact set. For this reason, our algorithm will fail to halt on very simple-looking problem instances where the given set is unbounded. Consider for example the problem instance (A,f,x0) consisting of the set A={xx0}, the function f(x)=2x, and the initial point x0=1. Since f does not map any compact set into its interior, our algorithm will fail to halt on this problem instance.

However, we will show that systems such as the above can be effectively treated by our algorithm after first applying a suitable compactification. More specifically, we show that the problem of deciding whether a point escapes a polyhedron (which is in general unbounded) under an affine linear map reduces to the Point Escape Problem for continuous functions in such a way that robust problem instances get mapped to robust problem instances. We conjecture that this reduction extends to more general non-linear systems that are sufficiently well behaved “at infinity”.

To discuss the applicability of our algorithm to a class of much more rigid non-linear systems, we consider the problem of deciding whether the origin in the complex plane has an unbounded orbit under a quadratic polynomial, represented by a single complex parameter. The existence of a complete algorithm for this problem is closely related to the computability of the Mandelbrot set [17]. We give a reduction of this problem to the Point Escape Problem that maps robust instances to robust instances if and only if the hyperbolicity conjecture holds true.

The rest of the paper is structured as follows: in Section 2 we review the relevant background material from computable analysis, discuss completeness of decision methods over continuous data, and formally introduce our representations of points, sets, and functions. Section 3 contains a formal description of our main algorithm and our main results: that the algorithm is correct, complete, and generically terminating. In Sections 4 and 5 we describe our applications to linear and quadratic systems respectively.

2 Preliminaries

2.1 Computable Analysis

We review some basic definitions and results from computable analysis. Good introductions to the subject are given in [44, 11, 22, 12, 32]. The key idea for computing with first-order objects such as real numbers and real functions is to encode them via integer sequences. Let denote the space of all sequences (pn)n of non-negative integers. We make into a topological space by endowing it with the product topology, which is generated by the distance function d((pn)n,(qn)n)=2inf{npnqn}. A sequence (pn)n is called computable if there exists a Turing machine which takes as input a natural number n and returns as output the natural number pn.

An oracle Turing machine computes a partial function f: if for all oracles Φ with (Φ(n))ndomf and all natural numbers N, the machine halts in finite time on input N with oracle Φ and outputs the number qN, where (qm)m=f((Φ(n))n). Observe that the oracle Φ is not a fixed function, but part of the input. Further, observe that we do not constrain the machine’s behaviour for oracle-inputs outside the domain of f. A partial function f: is called computable if it is computed by some Turing machine.

A represented space (X,δX) is a set X together with a partial surjective map δX:X. We will usually write just X for the represented space (X,δX) when δX is implicit or inferable from the context. Let X be a represented space, and let xX. A point p is called a name of x if pdomδX and δX(p)=x. The point x is called computable if it has a computable name.

Let f:XY be a function between represented spaces. A partial function F: is called a realiser of f if domFdomδX and δYF=fδX. The function f is called computable if it has a computable realiser. It is called continuous if it has a continuous realiser (with respect to the relative topology induced by the product topology on ).

If X is a set and δX:X and δX:X are representations, we say that δX and δX are computably equivalent or just equivalent if the identity idX:XX on X is computable as a map idX:(X,δX)(X,δX) and as a map idX:(X,δX)(X,δX) between represented spaces. By replacing “computable” with “continuous” in the above definition, we obtain the definition of topological equivalence.

Any representation δX:X induces a topology on X, namely the final topology, where UX is open if and only if δX1(U) is an open subset of domδX (with respect to the relative topology induced by the product topology on ). We will call this topology the topology of the represented space X. For a function f:XY between represented spaces, we have two a priori distinct notions of continuity available: continuity in the sense of having a continuous realiser, and topological continuity in the sense of being continuous with respect to the topologies on X and Y. Any continuous function is topologically continuous, but the converse is false in general. A representation δX:X is called admissible if all topologically continuous functions f:YX, where Y is a represented space, are continuous (cf. [32, Theorem 36]). All representations we consider in this paper will be admissible. Beyond this, we will only consider representations that are open maps, i.e. representations where every prefix of a name defines an open subset of the represented space. Intuitively, this means that all names contain the same amount of information.

2.2 Complete Decision Methods

An algorithm over discrete data is called complete if it halts on all inputs. A set is said to be decidable if there exists a complete algorithm that correctly determines whether a given input belongs to the set. If we apply the same definition to continuous data, we often end up with a trivial notion: if X is a represented space such as d or C(d,d) whose associated topology is connected, then the only decidable subsets of X in in the above sense are the empty set and X itself, for a decision method defines a computable function of type X{0,1} and this function must be continuous.

To obtain a more meaningful notion, the definition of “complete algorithm” must be extended in a different way. Let X be a represented space. Let AX. A (partial) decision method for A is an algorithm that takes as input the name of a point xX and either runs forever or halts in finite time. Upon halting, the algorithm is required to output the integer 1 if xA and the integer 0 if xA. The halting set of a decision method is the set of all xX such that the algorithm halts on all names of x (for open representations, a decision method that halts on some name of x automatically extends to a decision method that halts on all names of x). Letting A denote the boundary of A, it is easy to see that the halting set of a decision method is contained in XA. A decision method for A is complete if its halting set is equal to XA. A subset AX which admits a complete decision method is called maximally partially decidable or simply decidable. Observe that for any space X which carries the discrete topology, such as X=, any subset of X has empty boundary, so that our definition of decidability agrees with the usual definition. For spaces such as X=d, this definition of “decidability” yields a considerably richer structure than the trivial one induced by the naïve direct generalisation. For the spaces we are interested in, completeness can be characterised as a kind of optimality: If X admits an open representation, then a decision method for AX is complete if and only if its halting set contains the halting set of every decision method for A. This definition is further discussed and motivated in [25].

We will call a problem instance xX a robust instance if xA, and a boundary instance otherwise. Thus, an algorithm is complete if and only if it halts on all robust instances. Observe that if we witness an algorithm halting on a given problem instance xX, then we can identify a prefix p of the given name of x such that the algorithm halts on all names that extend p. When the representation of X is open, this prefix corresponds to an open neighbourhood of x where the answer to the problem is constant.

2.3 Encoding Points, Sets, and Functions

We describe representations of points in d, continuous functions dd, and closed and compact subsets of d. Our representations of points and functions are up to equivalence the usual standard representations of computable analysis that can be found in the literature [44]. Our representations of sets are equivalent to a join of certain standard representations.

Before we introduce our representations, let us introduce some standard notation and terminology. Throughout, we will work with the supremum norm x=max{|xi|i{1,,d}} and its induced metric d(x,y)=xy on d. For xd and r>0, we let B(x,r)={ydxy<r} and B¯(x,r)={ydxyr} denote the open and closed ball of radius r about x respectively. In d, the closed ball of radius r about x is the closure of the open ball of radius r about x. For a set Sd, we let B(S,r)={ydxS.xy<r}=xSB(x,r) and B¯(S,r)={ydxS.xyr}=xSB¯(x,r). Observe that B(S,r) is always an open set, while B¯(S,r) is not necessarily a closed set. In particular, B¯(S,r) is not necessarily equal to the closure of B(S,r). This is the case, however, if the set S is closed. For a proof, see [26, Proposition 23].

For continuous maps f,g:dd we let fg=sup{f(x)g(x)xd}[0,+]. For a compact set Kd let fg,K=sup{f(x)g(x)xK}[0,+). The set K is allowed to be empty in this definition. We define a distance function on the space C(d,d) of all continuous maps by

d(f,g)=n2nmin{1,fg,B¯(0,2n)}. (1)

We choose this metric since its induced topology is the same as the topology induced by the weakest representation of the space of continuous functions that renders evaluation computable – see Proposition 2.3.

In order to formulate our main algorithm, it will be convenient to work with subdivisions of d into dyadic rational cubes of uniform size. To facilitate this, we choose representations based on such subdivisions.

Let 𝒬nd={[x12n,x1+12n]××[xd2n,xd+12n]x1,,xd} denote the set of all d-dimensional dyadic rational cubes of side-length 2n. The sets 𝒬nd subdivide d into a cubical mesh of mesh-width 2n, with the interiors of distinct cubes being disjoint. Let 𝒬d=n𝒬nd.

For a subset A𝒬d of 𝒬d, we write |A|=QAQd. For a set Ad, we write 𝒬nd(A)={Q𝒬ndQA}. For sets A and B, we write AfinB to indicate that A is a finite subset of B.

For a set Ad, we let diamA=sup{d(x,y)x,yA} denote its diameter. We write A for the interior of A, A¯ for the closure of A, and A for the boundary of A. For sets A,Bd, we write AB if A¯B. It is clear that for finite subsets A, B of 𝒬d the relations |A||B| and |A||B| are decidable.

We will now introduce our representations of points, sets, and functions. Elements of 𝒬d and finite sets of elements of 𝒬d can be coded by natural numbers. We will fix appropriate encodings, without making them explicit.

Definition 1.

Define a representation ρd:d as follows:

Up to coding, a ρd-name of a point xd is a sequence (Xn)n of finite sets Xnfin𝒬nd satisfying x|Xn| for all n, |Xn+1||Xn| for all n, and diam|Xn|0 as n.

Proposition 2.

The representation ρd is open and admissible and induces the standard Euclidean topology on d, i.e., the topology generated by the norm ||||.

Proof.

See [26, Proposition 26].

A code of a multi-valued function F:𝒬nd([2n,2n]d)𝒬nd with finite values is an integer that encodes a list of the form (Q0,R0,0,,R0,N0),,(QM,RM,0,,RM,NM) where the sequence (Qi)i contains every element of the finite set 𝒬nd([2n,2n]d) exactly once, and for all i,j we have Ri,j𝒬nd. Such a list encodes the function that sends the cube Qi to the finite set {Ri,0,,Ri,Ni}.

Definition 3.

Define a representation [ρdρd]:C(d,d) as follows:

Up to coding, a [ρdρd]-name of a continuous function f:dd is a sequence (Fn)n of set-valued maps Fn:𝒬nd([2n,2n]d)𝒬nd with finite values satisfying the following requirements:

  1. 1.

    f(Q)|Fn(Q)| for all Q𝒬nd([2n,2n]d).

  2. 2.

    If Q𝒬nd([2n,2n]d) and Q𝒬n+1d([2n+1,2n+1]d) with QQ, then |Fn+1(Q)||Fn(Q)|.

  3. 3.

    If (Qn)nm, m, is a sequence of cubes with Qn𝒬nd([2n,2n]d), Qn+1Qn, and diamQn0 as n, then diam|Fn(Qn)|0 as n.

Proposition 4.

The representation [ρdρd] is open and admissible and induces the compact-open topology on C(d,d). This topology further coincides with the topology induced by the metric (1).

Proof.

See [26, Proposition 27].

For a set-valued function G:XY and a set AX, we write G(A)=xAG(x)Y.

The encoding of continuous functions makes function evaluation on points uniformly computable: if (Xn)n is a name of a point xd and (Fn)n is a name of a function f:dd then (Fn(Xn))n is a name of the point f(x) – potentially up to shifting the sequence to make Fn defined on Xn for all n. Further, if δ is any representation of C(d,d) that renders evaluation computable, then there exists an algorithm which translates a δ-name of f to a name (Fn)n of f with respect to the above representation. For a proof see [44, 39].

Continuous functions on compact sets are uniformly continuous. It is a folklore result in computable analysis that this fact is effectively witnessed by the above encodings (cf. also [22, Theorem 2.24]):

Lemma 5.

Let f:dd be a continuous function. Let K be a compact set. Then for all n there exists m such that for all Q𝒬md(K) we have diam|Fn(Q)|<2n.

Proof.

By definition, for all xK there exists Qx𝒬mxd(K) with diam|Fmx(Qx)|<2n. By monotonicity, if 𝒬mdQQx, then diam|Fm(Q)|diam|Fmx(Qx)|<2n.

By compactness of K, the cover xKQx must have a finite subcover Qx1,,Qxs. Now, there exists a number m such that every Q𝒬md(K) is contained in some Qxi with i{1,,s}. The claim follows.

A closed set will be represented by a sequence of lists of cubes that exhaust its complement, together with a sequence of lists of cubes that exhaust its interior.

Definition 6.

Define a representation αd:𝒜(d) of the set of closed subsets of d as follows: Up to coding, a αd-name of a closed set Ad is a sequence of pairs (InA,EnA)n of finite sets InA,EnAfin𝒬nd, satisfying the following properties:

  1. 1.

    |InA|A for all n.

  2. 2.

    A=n|InA|.

  3. 3.

    |EnA|dA for all n.

  4. 4.

    dA=n|EnA|.

  5. 5.

    If QInA and Q𝒬n+1d with QQ, then QIn+1A.

  6. 6.

    If QEnA and Q𝒬n+1d with QQ, then QEn+1A.

Proposition 7.

The representation αd is open and admissible.

Proof.

See [26, Proposition 28].

Observe that if (Xn)n is a name of a point xd and if (InA,EnA)n is a name of a closed set Ad, then xA if and only if for all large n we have XnInA and xdA if and only if for all large n we have XnEnA.

This property extends to arbitrary compact sets: If (InA,EnA)n is a name of a closed set, and K is a compact set which is contained in A or dA, then this containment is witnessed by a finite initial segment of the name (InA,EnA)n.

Proposition 8.

Let Kd be a compact set. Let (InA,EnA)n be a name of a closed set A. Then KA if and only if for all large n, the set K is contained in |InA|. We have KdA if and only if for all large n, the set K is contained in |EnA|.

Proof.

We show the claim for KA. The second claim is proved analogously. If K|InA| for some n then KA by definition. Now, assume that KA. Since |InA||In+1A| for all n, it suffices to show that there exists n such that K|InA|. We have KA=n|InA| Since K is compact, the open cover on the right-hand side must have a finite subcover. The claim follows.

3 The Point Escape Problem

We will now present our algorithm for maximally partially deciding whether a point escapes a closed set under the iteration of a continuous function. More precisely, we consider the following decision problem:

Definition 9.

The Point Escape Problem asks to decide for a given d, a continuous function f:dd, given via a [ρdρd]-name, a closed set Ad, given via an αd-name, and a given point x0A, given via a ρd-name, whether there exists a natural number n with fn(x)A.

An instance (f,A,x0) of the Point Escape Problem where fn(x)A for some n is called an escaping instance. An instance (f,A,x0) where fn(x)A for all n is called a trapped instance.

Algorithm 1 Point Escape Algorithm.
Algorithm 2 Point Escape Algorithm – nth Stage.

Algorithm 1 above takes as input a name (Fn)n of a continuous function f:dd, a name (InA,EnA)n of a closed set Ad, and a name (Xn)n of a point x0A. It either runs forever or halts within finitely many steps. Upon halting, it reports whether there exists n such that fn(x0)A. The algorithm proceeds in stages, working on a subdivision of [2n,2n]d into cubes of side-length 2n in each stage. The stages are described in Algorithm 2. At each stage, Algorithm 2 computes an overapproximation of the orbit of x0 to determine whether x0 escapes. At the same time, it searches for an invariant set under Fn which is contained in A, yielding an invariant set under f which is contained in A.

It is straightforward to verify that Algorithm 1 is correct, i.e., that it produces the correct answer upon halting.

Proposition 10.

Let Ad be a closed set, let f:dd be a continuous function, and let x0A be a point. Let (InA,EnA)n, (Fn)n, and (Xn)n be names of A, f, and x0 respectively. Assume that Algorithm 1 is given the inputs (InA,EnA)n, (Fn)n, and (Xn)n.

If the algorithm eventually halts, it correctly reports whether x0 is trapped or whether it escapes.

Proof.

See [26, Proposition 10].

3.1 Completeness

We will now show that our algorithm is complete, i.e. that it halts on all problem instances for which the answer is robust under small perturbations.

It is easy to see that the algorithm halts on all problem instances where the point escapes. We will show that if the point is trapped, termination of the algorithm is guaranteed by the existence of a robust invariant. Conversely, the absence of a robust invariant entails that the point escapes under arbitrarily small perturbations of the function.

Definition 11.

Let f:dd be a continuous function. A robust invariant for f is a compact set Vd such that f(V)V.

We first observe the following sufficient conditions for termination:

Proposition 12.

Let Ad be a closed set, let f:dd be a continuous function, and let x0A be a point. Let (InA,EnA)n, (Fn)n, and (Xn)n be names of A, f, and x0 respectively. Assume that Algorithm 1 is given the inputs (InA,EnA)n, (Fn)n, and (Xn)n.

  1. 1.

    If x0 escapes A under f, then the algorithm eventually halts.

  2. 2.

    If f(x0) is contained in the interior of a robust invariant V for f with VA, then the algorithm eventually halts.

Proof.

See [26, Proposition 12].

The core of the completeness proof is the following

Lemma 13.

Let f:dd be a continuous map. Let Kd be a compact set. Let x0K.

Assume that x0 is not contained in the interior of any robust invariant of f in K. Then for all ε>0 there exists a map f~:dd with f~f<ε such that x0 escapes K under f~.

Proof Sketch.

We will only sketch the proof idea. The full proof is given in [26, Appendix B].

Let ε>0. Consider the set E0=dK. Since K is compact and f is continuous, there exists 0<δ<ε/4 such that x0B¯(E0,δ) and such that x,yK, d(x,y)δ implies d(f(x),f(y))<ε/4.

Consider the compact set K0=KB(E0,δ). Then by construction, K0K and x0 is contained in the interior of the complement of K0. By assumption, K0 cannot be a robust invariant of f. Hence, the set E1={xKB(E0,δ)f(x)B¯(E0,δ)} must be non-empty. If x0B¯(E1,δ), we can repeat the same argument, applied to K1=K(B(E0,δ)B(E1,δ)) to obtain the non-empty closed set E2={xK(B(E0,δ)B(E1,δ))f(x)B¯(E1,δ)}.

Proceeding by induction, we obtain a sequence of non-empty closed subsets E1,E2, of K such that Ei is disjoint from j=0i1B(Ej,δ) and for xKj=0iB(Ej,δ) we have f(x)B¯(Ei,δ) if and only if xEi+1. A straightforward compactness argument shows that the sequence must be finite, so that there exist N1 with x0B¯(EN,δ) and x0B¯(Ei,δ) for i<N.

Now, since x0 is δ-close to an element of EN, which gets mapped δ-close to some element of EN1 under f, we can modify f on a small neighbourhood of x0 such that x0 gets mapped to a point x1EN1. We then proceed to modify f on a small neighbourhood of x1 to ensure that x1 maps to a point x2EN2. By induction, we obtain a sequence of points x1,,xN and a perturbation f~ of f by at most ε, such that f~(xi)=xi+1 and xNK.

Lemma 3.1 applies only to compact sets. It admits the following extension to arbitrary closed sets:

Lemma 14.

Let f:dd, let Ad be a closed set, and let x0A.

If there is no robust invariant V for f with f(x0)VVA, then there exist sequences (fn)n and (An)n with fnf and AnA such that x0A and x0 escapes An under fn.

Further, if Ad, then we may take An=A for all n.

Proof.

See [26, Lemma 14].

Our main theorem now follows immediately from Proposition 3, Proposition 3.1, and Lemma 3.1:

Theorem 15.

Let Ad be a closed set, let f:dd be a continuous function, and let x0A be a point. Let (InA,EnA)n, (Fn)n, and (Xn)n be names of A, f, and x respectively. Assume that Algorithm 1 is given the inputs (InA,EnA)n, (Fn)n, and (Xn)n.

  1. 1.

    If the algorithm eventually halts, it correctly reports whether x0 is trapped or whether it escapes.

  2. 2.

    If x0 escapes A under f, then the algorithm eventually halts.

  3. 3.

    If f(x0) is contained in the interior of a robust invariant V of f with IA, then the algorithm eventually halts.

  4. 4.

    If the algorithm does not halt, then there exist sequences (f0,n)n, (f1,n)n, (An)n with fi,nfn for i=0,1 and AnA, such that x0 escapes A0,n under f0,n and is trapped in A1,n under f1,n for all n. Moreover, if Ad, then we can choose A0,n=A1,n=A for all n.

In particular, Algorithm 1 is a complete decision method for the Point Escape Problem.

Theorem 15 establishes more than just the completeness of the algorithm: if A is not equal to all of d and the algorithm fails to halt on a problem instance (f,A,x0), then the answer to the problem is unstable under small perturbations of the function f alone. This implies that Algorithm 1 yields a complete decision method for the Special Point Escape Problem where A and x0 are fixed, and only f is given as an input. Of course, this result does not extend to the case where A=d since every point is robustly trapped in d, but not every function has a robust invariant.

3.2 Generic Termination

A complete algorithm for a decision problem need not be able to solve the problem on a “large” set of instances. For example, the set is maximally partially decided by the algorithm that never halts. Given a complete algorithm, one is thus led to the problem of characterising the “size” of its halting set.

All escaping instances of the Point Escape Problem are robustly escaping – in particular, Algorithm 1 halts on a dense set of inputs – which means that for every input (f,A,x0) there exists a sequence of inputs (fn,An,x0,n) with fnf, AnA, x0,nx0 such that the algorithm halts on input (fn,An,x0,n) for all n. Convergence is with respect to the final topology induced by the representation. It is of course not the case that all trapped instances are robustly trapped. However, we will show that the robustly trapped instances are typical among the trapped ones: every boundary instance (i.e. every trapped instance that is not robustly trapped) can be perturbed into a robustly trapped instance under arbitrarily small perturbations. In this sense, both the robustly escaping instances and the robustly trapped instances constitute “large” sets.

Lemma 16.

Let (f,K,x0) be a boundary instance of the Point Escape Problem, where K is a compact set. Then there exist sequences (fn)n and (Kn)n with fnf, KnK such that (fn,Kn,x0) is a robust trapped instance of the Point Escape Problem for all n.

Proof Sketch..

Since Algorithm 1 halts on all escaping instances, the instance (f,K,x0) must be trapped.

Let ε>0. Consider the compact set Kε=yKB¯(y,ε). Then the orbit {fn(x0)n} is contained in the interior of Kε.

By compactness, Kε admits a cover of the form i=0NB(yi,ε) with yiKε. The orbit {fn(x0)n} is contained in Kε, so that, by the pigeonhole principle, there exist minimal j<kN+1 such that fj(x0) and fk(x0) are contained in the same ball B(yi,ε). The points fj(x0),fj+1(x0),,fk1(x0) are uniformly bounded away from the boundary of Kε by some δ>0. We may further assume that the balls B¯(fi(x0),δ) are disjoint for i{j,,k} and that δ is so small that d(x,y)<δ implies d(f(x),f(y))<ε. For ji<k1 we replace f on B(fi(x0),δ/2) by the constant function with value fi+1(x0). On B(fk1(x0),δ/2), we replace f by the constant function with value fj(x0). To make the function continuous again, we use the annuli B(fi(x0),δ)B(fi(x0),δ/2) to connect f with the modified function via linear interpolation. Then the set i=jk1B¯(fi(x0),δ/2) is a robust invariant for the perturbed function which is contained in the interior of Kε and contains fj(x0) in its interior. From this, we easily obtain a robust invariant in the interior of Kε that contains x0 in its interior.

The full proof is given in [26, Appendix C].

Corollary 17.

Let (f,A,x0) be a boundary instance of the Point Escape Problem. Then there exist sequences (fn)n and (An)n with fnf, AnA such that (fn,An,x0) is a robust trapped instance of the Point Escape Problem for all n.

Proof.

The instance (f,A,x0) must be a trapped instance of the Point Escape Problem. We show that there exists a sequence of functions (fn)n and a sequence of compact sets (Kn)n with fnf and KnA such that (fn,Kn,x0) is a (not necessarily robust) trapped instance of the Point Escape Problem. Together with Lemma 3.2 this yields the claim.

We distinguish two cases: If the orbit of x0 under f is bounded, say, contained in the ball B¯(0,N) for some N, we let fn=f and Kn=B¯(0,N+2n) for all n. It is clear that x0 is trapped in Kn under f for all n. It is easy to see that KnA in the topology induced by our representation of closed sets.

Now assume that the orbit of x0 under f is unbounded. Fix some N>x. Let xj=f(j)(x0). Let n. Let m be the smallest index such that x0,,xm are contained in B¯(0,N+2n), but xm+1B¯(0,N+2n). Let δ=xm+1N2n>0. Let Kn=AB¯(0,N+2n+δ). Let
fn(x)={f(x)if xB¯(0,N+2n),xN2nδx0+(1xN2nδ)f(x)if xB¯(0,N+2n+δ)B¯(0,N+2n),x0if xdB¯(0,N+2n+δ).
Observe that by construction we have fn(xm+1)=x0, so that the orbit of x0 under fn is equal to {x0,,xm+1}Kn. It is easy to see (for example by using Proposition 2.3) that fnf in the topology induced by our representation of functions and that KnK in the topology induced by our representation of closed sets.

4 Linear Systems

As mentioned in the introduction, Algorithm 1 may fail to terminate on very simple-looking problem instances when A is not a compact set. The main reason for this is that our representation of continuous functions induces the topology of uniform convergence on compact sets, or equivalently, the topology induced by the metric (1). In order for two functions f,g:dd to have distance at most 2n, it suffices that f and g agree on the cube [2n+1,2n+1]d, potentially admitting function values of arbitrarily large distance outside of this cube. Thus, every function f has “arbitrarily small” perturbations that differ from f arbitrarily outside a certain bounded set.

Revisiting the example from the introduction, consider the set A={xx0}, the initial point x0=1A, and the map f:, f(x)=2x. It is clear that the point x0 is trapped in A under iteration of f. However, it cannot be robustly trapped, since f does not admit any robust invariants. More explicitly, with respect to the metric (1), f is the limit of the sequence

fn(x)=min{2x,(12n+1)x+(1+2n+1)(2n1)}.

We have fnn(1)=2n and fn(2n)=1, so that x0 escapes A under each fn.

While a naïve direct application of Algorithm 1 fails to verify that the system is trapped, we can exploit the fact that the particular f and A given above are well behaved “near infinity” to compute a compactified version of the system that is amenable to analysis via Algorithm 1.

Consider the map Φ:(1,1),Φ(x)=x1+|x|. This map has a continuous inverse, explicitly given by Φ1:(1,1),Φ1(x)=x1|x|. We have ΦfΦ1(x)=2x1+|x|. The expression on the right-hand side of this equality defines a total function f¯(x):. Observe that a point x is trapped in A under f if and only if Φ(x) is trapped in A under f¯. The latter can be verified by Algorithm 1 for all x>0, since f¯ admits the robust invariant [Φ(x)2,2] with Φ(x)(Φ(x)2,2)[Φ(x)2,2]A.

To further illustrate how the scope of Algorithm 1 can be extended using this compactification technique, we generalise the above observation to give a solution for the problem of deciding whether a point escapes a polyhedron (which is in general unbounded) under the iteration of an affine linear map:

Definition 18.

The Linear Escape Problem asks to determine for a given non-singular matrix Ad×d, a given vector bd, a given polyhedron Pd, and a given point x0d whether x0 escapes P under the map fA,b(x)=Ax+b.

Here, A is given by a ρd×d-name of its entries, and P is given by a finite list of affine half-spaces H1,,Hm with P=i=1mHi, where each Hi is given by a ρd-name of a normal 0Nid and a ρ1-name of a distance Di, such that Hi={xdNixDi}.

We will give a reduction of the Linear Escape Problem to the Point Escape Problem that sends robust instances to robust instances based on the compactification idea discussed above.

Before we describe the reduction, we classify the robust instances of the Linear Escape Problem. Since all escaping instances are robust, we focus only on trapped instances.

For a matrix A, let σ(A)fin denote the set of its eigenvalues and r(A)=max{|λ|λσ(A)} denote the largest value among the absolute values of its eigenvalues.

For a polyhedron P=i=1mHi with Hi={xdNixD}, we let P0=i=1mHi0, where Hi0={xdNix0}.

Lemma 19.

Let (A,b,P,x0) be a trapped instance of the Linear Escape Problem. Then (A,b,P,x0) is robust if and only if the orbit (fA,bn(x0))n is contained in the interior of P and one of the three following conditions is met:

  1. 1.

    r(A)<1 and the unique fixed point of the map fA,b(x)=Ax+b is contained in P.

  2. 2.

    A has a simple real eigenvalue ρ>1 with ρ>|λ| for all other eigenvalues and there exists an eigenvector v for ρ with vP0 and x0=αv+w where α>0 and w is a linear combination of eigenvalues and generalised eigenvalues for eigenvalues λρ (in the sense of the real Jordan normal form).

  3. 3.

    A has the simple real eigenvalue ρ=1 with ρ>|λ| for all other eigenvalues, there exists an eigenvector v for ρ with vP0 such that x0=αv+w, b=βv+u, where α,β>0, and w and u are linear combinations of eigenvalues and generalised eigenvalues for eigenvalues λρ (in the sense of the real Jordan normal form).

Proof.

The proof is very similar to that of [25, Proposition 5.1, Proposition 6.2.]. It is given in [26, Appendix D].

We now describe the reduction to the Point Escape Problem.

Consider the continuous map Φ:dB(0,1),Φ(x)=x1+x. This map is invertible with inverse Φ1:B(0,1)d,Φ1(x)=x1x. The map ΦfA,bΦ1:B(0,1)B(0,1) extends (uniformly computably) to the continuous map

f¯A,b:dd,f¯A,b(x)=Ax+(1min{1,x})bAx+(1min{1,x})b+1min{1,x}.

For a polyhedron P=i=1mHi with Hi={xdNxD}, we define P^=i=1mH^i, where Hi^={xdNxD(1min{1,x})}. Observe that Φ(P)=P^B(0,1).

Proposition 20.

The point x0 is trapped in P under fA,b if and only if the point x01+x0 is trapped in P^ under f¯A,b.

Proof.

Since Φ is bijective we have xP if and only if Φ(x)Φ(P)=P^B(0,1). On B(0,1), the map f¯A,b agrees with ΦfA,bΦ1, which maps B(0,1) to B(0,1). It follows that we have f¯A,bn(Φ(x0))=ΦfA,bn(x0), which yields the claim.

We now obtain our desired reduction:

Proposition 21.

The instance (A,b,P,x0) is a robust instance of the Linear Point Escape Problem if and only if the instance (f¯A,b,P^,Φ(x0)) is a robust instance of the Point Escape Problem.

Proof.

If the instance escapes, the claim is obvious. Thus, assume that the instance is trapped. We show that f¯A,b has a robust invariant in the interior of P^.

Consider the classification of robust instances given in Lemma 4.

In the first case, it follows from the proof of Lemma 4 that the point p=Φ((IA)1b) is a fixed point of f¯A,b such that every point in B(0,1) converges to Φ((IA)1b) under the iteration of f¯A,b. Moreover, for a sufficiently small ε>0 and sufficiently large N, the ball B¯(p,ε) is mapped by f¯A,bN inside the ball B(p,ε/2).

In the second and third case, it follows from the proof of Lemma 4 that the point p=vv is a fixed point of f¯A,b with f¯A,bn(Φ(x0))p as n. Moreover, for a sufficiently small ε>0 and sufficiently large N, the ball B¯(p,ε) is mapped by f¯A,bN inside the ball B(p,ε/2).

In either case, for sufficiently small ε>0, the ball B¯(p,ε) is a robust invariant of f¯A,bN for some N which is contained in the interior of P^, such that all xB¯(p,ε) remain in the interior of P^ under iteration of f¯A,b, f¯A,bk(x0)B(p,ε) for some k, and f¯A,bj(x0)P^ for all jk.

It now follows from [26, Proposition 31, Proposition 32] that f¯A,b(x0) is contained in the interior of a robust invariant of f¯A,b which is contained in the interior of P^. Theorem 15 yields that the instance is robust.

5 The Quadratic Family

As a final application of Algorithm 1, we provide a complete decision method for the Mandelbrot set subject to the hyperbolicity conjecture. The Mandelbrot set is the set of all parameters c such that the orbit of the origin 0 under the map fc(z)=z2+c is bounded. The Mandelbrot set is a compact connected subset of . Despite being best known for its numerous computer-generated depictions [33], it is unknown whether there exists any rigorous algorithm for computing accurate images of to a given resolution. See [13] for a good discussion of this. This has lead Penrose [34] to go as far as conjecturing that the Mandelbrot set might be an uncomputable subset of , however without specifying a computational model. Shortly after Penrose made his conjecture, Blum and Smale [8] showed that the Mandelbrot set is undecidable in the BSS-model of real computation [7]. However, Brattka [10] soon raised the objection that BSS-decidability does not adequately capture the intuitive notion of computability that Penrose had in mind: In fact, Penrose explicitly mentions the closed epigraph of the exponential function as an example of an intuitively computable subset of the complex plane. However, all BSS-decidable subsets of must be semi-algebraic, so that the epigraph of the exponential function is BSS-undecidable. Computable analysis offers an alternative definition of computability: a subset X of the complex plane is called computable if its distance function dX:,dX(c)=inf{|cz|zX} is computable. It is quite easy to see that the distance function of a compact set is computable if and only if the set can be plotted at any given resolution – see for example [13] for details.

Hertling [17] showed that is computable in this sense subject to the hyperbolicity conjecture, which we describe below. He even showed that under this conjecture the signed distance function ds(c)=(1)χ(c)d(c) is computable. This is stronger than computability, as there exist sets whose distance function is computable but whose signed distance function is not. It follows from Hertling’s work that the signed distance function of is computable if and only if is maximally partially decidable.

The problem of maximally partially deciding the Mandelbrot set reduces to the Point Escape Problem as follows: map c=a+ib to the Point Escape Problem instance (gc,B¯(0,3),0), where gc(x,y)=(x2y2+a,2xy+b). Observe that gc(x,y)=(Re(fc(x+iy)),Im(fc(x+iy))).

We will discuss how much of the Mandelbrot set our algorithm for the Point Escape Problem is able to compute under this reduction. To state our main result we require one more definition. A point c in the interior of is called hyperbolic if fc has an attracting cycle, i.e. there exist z0 and n with fcn(z0)=z0, fcj(z0)fck(z0) for j,k<n, and |ddz(fcn)(z0)|<1.

The hyperbolicity conjecture states that every point in the interior of is hyperbolic. We obtain the following result:

Theorem 22.

The decision problem for the Mandelbrot set reduces to the General Escape Problem via the reduction above. This reduction maps a parameter c to a robust instance of the General Escape Problem if and only if c belongs to or to a hyperbolic component of the interior of . In particular, the reduction maps robust instances to robust instances if and only if the hyperbolicity conjecture holds true.

Proof.

Consider the map c(gc,B¯(0,3),0) defined above. It is easy to see that this is really a reduction. It is obvious that – under this reduction – Algorithm 1 halts on all parameters outside and that Algorithm 1 does not halt on any boundary point.

Now, let c. Assume first that c is hyperbolic. Then c has an attracting cycle {z0,z1,,zn1} as described above. A celebrated theorem by Fatou [9, Theorem 1] asserts that the origin is attracted by this attracting cycle, i.e. for all ε there exists N such that |fcN(0)z0|<ε.

We show that the attracting cycle induces a robust invariant. Since |ddz(fcn)(z0)|<1, there exists δ>0 such that |ddz(fcn)(z0)|<1δ. Further, observe that by the chain rule we have ddz(fcn)(z0)=ddz(fcn)(fk(z0)) for all k. By continuity, there exists a number ε>0 such that |ddz(fcn)(z)|<1δ for all z with |zfk(z0)|<ε for some k. Consider the set K=j=0n1B¯(fck(z0),ε). It follows from the uniform bound on the first derivative that on K, the function fcn is Lipschitz-continuous with Lipschitz constant 1δ. Let zK with |zfck(z0)|<ε. Then we obtain:

|fcn(fc(z))fck(z0)|=|fcn(fc(z))fcn(fck(z0))||1δ||fcn(z)fck(z0)||1δ|ε<ε.

So K is a robust invariant for fcn. Since 0 is attracted by the attracting cycle, we have fN(0)K for sufficiently large N.

It now follows from [26, Proposition 31, Proposition 32] that there exists a robust invariant for fc whose interior contains 0. This invariant must be contained in the closed disk of radius 2, for any orbit of fc that contains an element of absolute value greater than 2 must be unbounded. In particular, it must be contained in the open disk of radius 3. Hence, Algorithm 1 halts on input (gc,B¯(0,3),0).

Suppose on the other hand that c belongs to a non-hyperbolic component of the interior of . Let Kc={zfcn(z) is bounded} denote the filled-in Julia set of c. It can be shown (see [15]) that since c belongs to a non-hyperbolic component of the interior of , we must have cKc=Kc. This implies that for all ε>0 there exists zε with |zεc|<ε and zεKc. Since the orbit fcn(zε) is unbounded and disjoint from Kc with 0Kc, there exists a number δ>0 with |fcn(zε)|>δ. Thus, if we define fε(z) to be equal to fc(z) if |z|δ and to otherwise be defined by fε(z)=zε(1|z|δ)+fc(z)|z|δ, then the orbit of 0 under fε is unbounded, and fεfc<ε. This shows that Algorithm 1 cannot halt on input (gc,B¯(0,3),0).

6 Conclusion and Future Work

We have studied the problem of deciding for a given set, initial point, and function whether the initial point escapes the set under iteration of the function. We have allowed arbitrary continuous functions as inputs, represented by the weakest representation that makes function evaluation uniformly computable. We have given an algorithm that certifies that the initial point is trapped by searching for a robust invariant. We have shown that this algorithm is complete in the sense that no sound algorithm can detect further trapped instances. This settles the very natural question of how much is decidable about the escape problem when we are given just enough information about our system to compute the orbit of a given point. In general, computable analysis allows us to ask and answer questions of this form: if we are given a certain (limited) amount of information about a system, how much can we say about the system’s behaviour? This leads to various natural directions for future work: On the one hand, it would be very interesting to study more general systems, for example by replacing d with a locally compact metric space X. On the other hand, it would be interesting to study more special systems which are presented with additional information, such as polynomials or other subclasses of analytic maps which are “well-behaved at infinity” such as Pfaffian functions. We have provided partial evidence that, somewhat surprisingly, our algorithm for general systems yields maximal partial algorithms for rather rigid special systems, such as linear systems and – conjecturally – one-dimensional complex quadratic systems. It would be very interesting to determine whether this reduction extends, for example, to higher-degree multivariate polynomials.

References

  • [1] Manindra Agrawal, S. Akshay, Blaise Genest, and P.S. Thiagarajan. Approximate Verification of the Symbolic Dynamics of Markov Chains. In 2012 27th Annual IEEE Symposium on Logic in Computer Science, pages 55–64, 2012. doi:10.1109/LICS.2012.17.
  • [2] S. Akshay, Hugo Bazille, Blaise Genest, and Mihir Vahanwala. On Robustness for the Skolem and Positivity Problems. In Petra Berenbrink and Benjamin Monmege, editors, 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022, March 15-18, 2022, Marseille, France (Virtual Conference), volume 219 of LIPIcs, pages 5:1–5:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPIcs.STACS.2022.5.
  • [3] Christel Baier, Florian Funke, Simon Jantsch, Toghrul Karimov, Engel Lefaucheux, Joël Ouaknine, Amaury Pouly, David Purser, and Markus A. Whiteland. Reachability in Dynamical Systems with Rounding. In Nitin Saxena and Sunil Simon, editors, 40th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2020, December 14-18, 2020, BITS Pilani, K K Birla Goa Campus, Goa, India (Virtual Conference), volume 182 of LIPIcs, pages 36:1–36:17. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPIcs.FSTTCS.2020.36.
  • [4] William J. Baumol. Economic Dynamics. Prentice Hall, 1970.
  • [5] Jason P. Bell and Stefan Gerhold. On the positivity set of a linear recurrence. Israel Journal of Mathematics, 157:333–345, 2007. doi:10.1007/s11856-006-0015-1.
  • [6] Vincent D. Blondel, Emmanuel Jeandel, Pascal Koiran, and Natacha Portier. Decidable and Undecidable Problems about Quantum Automata. SIAM Journal on Computing, 34(6):1464–1473, 2005. doi:10.1137/S0097539703425861.
  • [7] Lenore Blum, Felipe Cucker, Michael Shub, and Steve Smale. Complexity and Real Computation. Springer, 1998.
  • [8] Lenore Blum and Steve Smale. The Gödel Incompleteness Theorem and Decidability over a Ring. In Morris W. Hirsch, Jerrold E. Marsden, and Michael Shub, editors, From Topology to Computation: Proceedings of the Smalefest, pages 321–339, New York, NY, 1993. Springer US. doi:10.1007/978-1-4612-2740-3_32.
  • [9] Bodil Branner. The Mandelbrot Set. In Robert L. Devaney and Linda Keen, editors, Chaos and Fractals: The Mathematics Behind the Computer Graphics, pages 75–106. American Mathematical Society, 1989.
  • [10] Vasco Brattka. The emperor’s new recursiveness: The epigraph of the exponential function in two models of computability. In Masami Ito and Teruo Imaoka, editors, Words, Languages & Combinatorics III, pages 63–72, 2003.
  • [11] Vasco Brattka and Peter Hertling, editors. Handbook of Computability and Complexity in Analysis, Theory and Applications of Computability, Cham, 2021. Springer. doi:10.1007/978-3-030-59234-9.
  • [12] Vasco Brattka and Gero Presser. Computability on subsets of metric spaces. Theoretical Computer Science, 305(1 – 3):43–76, 2003. doi:10.1016/S0304-3975(02)00693-X.
  • [13] Mark Braverman and Michael Yampolsky. Computability of Julia Sets. Springer, 2009.
  • [14] Julian D’Costa, Toghrul Karimov, Rupak Majumdar, Joël Ouaknine, Mahmoud Salamati, Sadegh Soudjani, and James Worrell. The Pseudo-Skolem Problem is Decidable. In Filippo Bonchi and Simon J. Puglisi, editors, 46th International Symposium on Mathematical Foundations of Computer Science, MFCS 2021, August 23-27, 2021, Tallinn, Estonia, volume 202 of LIPIcs, pages 34:1–34:21. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPIcs.MFCS.2021.34.
  • [15] Adrien Douady and John H. Hubbard. Étude dynamique des polynômes complexes. Publications mathématiques d’Orsay, 1984.
  • [16] Stefan Gerhold and Manuel Kauers. A procedure for proving special function inequalities involving a discrete parameter. In Manuel Kauers, editor, Symbolic and Algebraic Computation, International Symposium ISSAC 2005, Beijing, China, July 24-27, 2005, Proceedings, pages 156–162. ACM, 2005. doi:10.1145/1073884.1073907.
  • [17] Peter Hertling. Is the Mandelbrot set computable? Mathematical Logic Quarterly, 51(1):5–18, 2005. doi:10.1002/malq.200310124.
  • [18] Mathieu Hoyrup and Cristóbal Rojas. On the Information Carried by Programs About the Objects they Compute. Theor. Comp. Sys., 61(4):1214–1236, November 2017. doi:10.1007/s00224-016-9726-9.
  • [19] Manuel Kauers and Veronika Pillwein. When can we detect that a P-finite sequence is positive? In Wolfram Koepf, editor, Symbolic and Algebraic Computation, International Symposium, ISSAC 2010, Munich, Germany, July 25-28, 2010, Proceedings, pages 195–201. ACM, 2010. doi:10.1145/1837934.1837974.
  • [20] George Kenison. The Threshold Problem for Hypergeometric Sequences with Quadratic Parameters. In Karl Bringmann, Martin Grohe, Gabriele Puppis, and Ola Svensson, editors, 51st International Colloquium on Automata, Languages, and Programming (ICALP 2024), volume 297 of Leibniz International Proceedings in Informatics (LIPIcs), pages 145:1–145:20, Dagstuhl, Germany, 2024. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ICALP.2024.145.
  • [21] George Kenison, Oleksiy Klurman, Engel Lefaucheux, Florian Luca, Pieter Moree, Joël Ouaknine, Markus A. Whiteland, and James Worrell. On Positivity and Minimality for Second-Order Holonomic Sequences. CoRR, abs/2007.12282, 2020. arXiv:2007.12282.
  • [22] Ker-I Ko. Complexity theory of real functions. Progress in Theoretical Computer Science. Birkhäuser Boston, Inc., Boston, MA, 1991. doi:10.1007/978-1-4684-6802-1.
  • [23] Boris A. Kushner. Markov’s constructive analysis; a participant’s view. Theoretical Computer Science, 219(1):267–285, 1999. doi:10.1016/S0304-3975(98)00291-6.
  • [24] Stephen Melczer and Marc Mezzarobba. Sequence positivity through numeric analytic continuation: uniqueness of the Canham model for biomembranes. Comb. Theory, 2(2):Paper No. 4, 20, 2022. doi:10.5070/C62257847.
  • [25] Eike Neumann. Decision problems for linear recurrences involving arbitrary real numbers. Logical Methods in Computer Science, Volume 17, Issue 3, August 2021. doi:10.46298/lmcs-17(3:16)2021.
  • [26] Eike Neumann. Deciding Robust Instances of an Escape Problem for Dynamical Systems in Euclidean Space, 2025. doi:10.48550/arXiv.2506.21481.
  • [27] Eike Neumann, Joël Ouaknine, and James Worrell. Decision Problems for Second-Order Holonomic Recurrences. In Nikhil Bansal, Emanuela Merelli, and James Worrell, editors, 48th International Colloquium on Automata, Languages, and Programming, ICALP 2021, July 12-16, 2021, Glasgow, Scotland (Virtual Conference), volume 198 of LIPIcs, pages 99:1–99:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPIcs.ICALP.2021.99.
  • [28] Joël Ouaknine and James Worrell. On the Positivity Problem for Simple Linear Recurrence Sequences. In Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, and Elias Koutsoupias, editors, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II, volume 8573 of Lecture Notes in Computer Science, pages 318–329. Springer, 2014. doi:10.1007/978-3-662-43951-7_27.
  • [29] Joël Ouaknine and James Worrell. Positivity Problems for Low-Order Linear Recurrence Sequences. In Chandra Chekuri, editor, Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 366–379. SIAM, 2014. doi:10.1137/1.9781611973402.27.
  • [30] Joël Ouaknine and James Worrell. Ultimate Positivity is Decidable for Simple Linear Recurrence Sequences. In Javier Esparza, Pierre Fraigniaud, Thore Husfeldt, and Elias Koutsoupias, editors, Automata, Languages, and Programming - 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part II, volume 8573 of Lecture Notes in Computer Science, pages 330–341. Springer, 2014. doi:10.1007/978-3-662-43951-7_28.
  • [31] Joël Ouaknine and James Worrell. On linear recurrence sequences and loop termination. ACM SIGLOG News, 2(2):4–13, 2015. doi:10.1145/2766189.2766191.
  • [32] Arno Pauly. On the topological aspects of the theory of represented spaces. Computability, 5(2):159–180, 2016. doi:10.3233/COM-150049.
  • [33] Heinz-Otto Peitgen and Peter Richter. The Beauty of Fractals. Springer-Verlag, Heidelberg, 1986.
  • [34] Roger Penrose. The Emperor’s New Mind. Oxford University Press, 1989.
  • [35] Veronika Pillwein. Positivity of certain sums over Jacobi kernel polynomials. Advances in Applied Mathematics, 41(3), 2008. doi:10.1016/J.AAM.2007.12.001.
  • [36] Veronika Pillwein. Termination Conditions for Positivity Proving Procedures. In Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, ISSAC ’13, pages 315–322, New York, NY, USA, 2013. Association for Computing Machinery. doi:10.1145/2465506.2465945.
  • [37] Veronika Pillwein and Miriam Schussler. An efficient procedure deciding positivity for a class of holonomic sequences. ACM Communications in Computer Algebra, 49(3):90–93, 2015. Extended abstract of the poster presentation at ISSAC 2015.
  • [38] Stefan Ratschan. Safety verification of non-linear hybrid systems is quasi-decidable. Formal Methods in System Design, 44(1):71–90, 2014. doi:10.1007/s10703-013-0196-2.
  • [39] Matthias Schröder. Admissible Representations for Continuous Computations. PhD thesis, FernUniversität Hagen, 2002.
  • [40] G. Szegö. Über gewisse Potenzreihen mit lauter positiven Koeffizienten. Mathematische Zeitschrift, 37:674–688, 1933. URL: http://eudml.org/doc/168480.
  • [41] R. Tijdeman, M. Mignotte, and T.N. Shorey. The distance between terms of an algebraic recurrence sequence. Journal für die reine und angewandte Mathematik, 349:63–76, 1984. URL: http://eudml.org/doc/152622.
  • [42] Ashish Tiwari. Termination of Linear Programs. In CAV’04, volume 3114 of LNCS. Springer, 2004. doi:10.1007/978-3-540-27813-9_6.
  • [43] N.K. Vereshchagin. Occurrence of zero in a linear recursive sequence. Mat. Zametki, 38(2):177–189, 1985.
  • [44] Klaus Weihrauch. Computable Analysis. Springer, 2000.
  • [45] Thomas Yu and Jingmin Chen. Uniqueness of Clifford torus with prescribed isoperimetric ratio. Proceedings of the American Mathematical Society, 150, 2022. doi:10.1090/proc/15750.