philos

Transcript

1 Why Philosophers Should Care About Computational Complexity ∗ Scott Aaronson Abstract One might think that, once we know something is computable, how efficiently it can be com- puted is a practical question with little further philosophical importance. In this essay, I offer a computational complexity the- detailed case that one would be wrong. In particular, I argue that —the field that studies the resources (such as time, space, and randomness) needed to solve ory computational problems—leads to new perspectives on the nature of mathematical knowledge, the strong AI debate, computationalism, the problem of logical omniscience, Hume’s problem of induction, Goodman’s grue riddle, the foundations of quantum mechanics, economic rationality, closed timelike curves, and several other topics of philosophical interest. I end by discussing aspects of complexity theory itself that could benefit from philosophical analysis. Contents 1 Introduction 2 1.1 What This Essay Cover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Won’t 2 Complexity 101 5 3 The Relevance of Polynomial Time 6 3.1 The Entscheidungsproblem Revisited . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 8 3.2 Evolvability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Known Integers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4 Computational Complexity and the Turing Test 10 4.1 The Lookup-Table Argument . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.2 Relation to Previous Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4.3 Can Humans Solve NP -Complete Problems Efficiently? . . . . . . . . . . . . . . . . . 14 4.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 16 5 The Problem of Logical Omniscience 5.1 The Cobham Axioms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5.2 Omniscience Versus Infinity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 5.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 ∗ MIT. Email: [email protected] This material is based upon work supported by the National Science Foundation under Grant No. 0844626. Also supported by a DARPA YFA grant, the Sloan Foundation, and a TIBCO Chair. 1

2 6 Computationalism and Waterfalls 22 6.1 “Reductions” That Do All The Work . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 7 PAC-Learning and the Problem of Induction 25 7.1 Drawbacks of the Basic PAC Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 7.2 Computational Complexity, Bleen, and Grue . . . . . . . . . . . . . . . . . . . . . . 29 8 Quantum Computing 32 8.1 Quantum Computing and the Many-Worlds Interpretation . . . . . . . . . . . . . . . 34 37 9 New Computational Notions of Proof 9.1 Zero-Knowledge Proofs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 9.2 Other New Notions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 10 Complexity, Space, and Time 41 10.1 Closed Timelike Curves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 10.2 The Evolutionary Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 10.3 Closed Timelike Curve Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 11 Economics 46 11.1 Bounded Rationality and the Iterated Prisoners’ Dilemma . . . . . . . . . . . . . . . 46 11.2 The Complexity of Equilibria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 12 Conclusions 48 12.1 Criticisms of Complexity Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 12.2 Future Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 13 Acknowledgments 51 1 Introduction The view that machines cannot give rise to surprises is due, I believe, to a fallacy to which philosophers and mathematicians are particularly subject. This is the assumption that as soon as a fact is presented to a mind all consequences of that fact spring into the mind simultaneously with it. It is a very useful assumption under many circumstances, but one too easily forgets that it is false. —Alan M. Turing [130] The theory of computing, created by Alan Turing, Alonzo Church, Kurt G ̈odel, and others in Indeed, the 1930s, didn’t only change civilization; it also had a lasting impact on philosophy. clarifying philosophical issues was the original point of their work; the technological payoffs only came later! Today, it would be hard to imagine a serious discussion about (say) the philosophy of mind, the foundations of mathematics, or the prospects of machine intelligence that was uninformed by this revolution in human knowledge three-quarters of a century ago. However, as computers became widely available starting in the 1960s, computer scientists in- creasingly came to see computability theory as not asking quite the right questions. For almost all the problems we actually want to solve turn out to be computable in Turing’s sense; the real question is which problems are efficiently or feasibly computable. The latter question gave rise to a 2

3 new field, called computational complexity theory (not to be confused with the “other” complexity theory, which studies complex systems such as cellular automata). Since the 1970s, computational NP -completeness, complexity theory has witnessed some spectacular discoveries, which include public-key cryptography, new types of mathematical proof (such as probabilistic, interactive, and zero-knowledge proofs), and the theoretical foundations of machine learning and quantum compu- tation. To people who work on these topics, the work of G ̈odel and Turing may look in retrospect like just a warmup to the “big” questions about computation. influenced philosophy to Because of this, I find it surprising that complexity theory has not Several anything like the extent computability theory has. The question arises: why hasn’t it? possible answers spring to mind: maybe computability theory just had richer philosophical im- plications. (Though as we’ll see, one can make a strong case for exactly the opposite.) Maybe same complexity has essentially the philosophical implications as computability, and computability got there first. Maybe outsiders are scared away from learning complexity theory by the “math barrier.” Maybe the explanation is social: the world where G ̈odel, Turing, Wittgenstein, and Russell participated in the same intellectual conversation vanished with World War II; after that, theoretical computer science came to be driven by technology and lost touch with its philosophical origins. Maybe recent advances in complexity theory simply haven’t had enough time to enter philosophical consciousness. complexity theorists’ failure to communicate However, I suspect that part of the answer is just Hence this essay, whose modest goal is what they can add to philosophy’s conceptual arsenal. to help correct that failure, by surveying some aspects of complexity theory that might interest philosophers, as well as some philosophical problems that I think a complexity perspective can clarify. To forestall misunderstandings, let me add a note of humility before going further. This essay will touch on many problems that philosophers have debated for generations, such as strong AI, the problem of induction, the relation between syntax and semantics, and the interpretation of quantum mechanics. will I claim that computational complexity theory In none of these cases “dissolves” the philosophical problem—only that it contributes useful perspectives and insights. I’ll often explicitly mention philosophical puzzles that I think a complexity analysis either leaves untouched or else introduces itself. But even where I don’t do so, one shouldn’t presume that I think there are no such puzzles! Indeed, one of my hopes for this essay is that computer scientists, mathematicians, and other technical people who read it will come away with a better appreciation 1 for the subtlety of some of the problems considered in modern analytic philosophy. Won’t Cover 1.1 What This Essay I won’t try to discuss every possible connection between computational complexity and philosophy, or even every connection that’s already been made. A small number of philosophers have long invoked computational complexity ideas in their work; indeed, the “philpapers archive” lists 32 2 The majority of those papers prove theo- papers under the heading Computational Complexity. rems about the computational complexities of various logical systems. Of the remaining papers, some use “computational complexity” in a different sense than I do—for example, to encompass 1 When I use the word “philosophy” in this essay, I’ll mean philosophy within the analytic tradition. I don’t understand Continental or Eastern philosophy well enough to say whether they have any interesting connections with computational complexity theory. 2 See philpapers.org/browse/computational-complexity 3

4 computability theory—and some invoke the concept of computational complexity, but no particular field devoted to it. Perhaps the closest in spirit to this essay are the interesting results from the articles by Cherniak [40] and Morton [98]. In addition, many writers have made some version of the observations in Section 4, about computational complexity and the Turing Test: see for example Block [30], Parberry [102], Levesque [88], and Shieber [118]. In deciding which connections to include in this essay, I adopted the following ground rules: (1) The connection must involve a “properly philosophical” problem—for example, the justifica- tion for induction or the nature of mathematical knowledge—and not just a technical problem in logic or model theory. from the field of computational complexity (2) The connection must draw on specific insights of complexity, or the fact that there exist hard problems. idea theory: not just the There are many philosophically-interesting ideas in modern complexity theory that this essay One example is pseudorandom generators (see Goldreich mentions only briefly or not at all. [64]): functions that convert a short random “seed” into a long string of bits that, while not truly random, is so “random-looking” that no efficient algorithm can detect any regularities in 3 While pseudorandom generators in this sense are not yet proved to exist, there are many it. plausible candidates, and the belief that at least some of the candidates work is central to modern cryptography. (Section 7.1 will invoke the related concept of pseudorandom functions .) A second fully homomorphic encryption : an extremely exciting new class of methods, the first of example is which was announced by Gentry [61] in 2009, for performing arbitrary computations on encrypted data without ever decrypting the data . The output of such a computation will look like meaningless gibberish to the person who computed it, but it can nevertheless be understood (and even recognized as the correct output) by someone who knows the decryption key. What are the implications of pseudorandom generators for the foundations of probability, or of fully homomorphic encryption for debates about the semantic meaning of computations? I very much hope that this essay will inspire others to tackle these and similar questions. Outside of computational complexity, there are at least three other major intersection points between philosophy and modern theoretical computer science. The first one is the semantics of 4 programming languages , which has large and obvious connections to the philosophy of language. distributed systems theory The second is , which provides both an application area and a rich source of examples for philosophical work on reasoning about knowledge (see Fagin et al. [54] and Stalnaker [126]). The third is Kolmogorov complexity (see Li and Vit ́anyi [90]) which studies the length of the shortest computer program that achieves some functionality, disregarding time, memory, and 5 other resources used by the program. In this essay, I won’t discuss any of these connections, except in passing (for example, Section 5 touches on logics of knowledge in the context of the “logical omniscience problem,” and Section 7 touches on Kolmogorov complexity in the context of PAC-learning). In defense of these omissions, let me offer four excuses. First, these other connections fall outside my stated topic. Second, they 3 The conjecture that pseudorandom generators exist implies the P 6 = NP conjecture (about which more later), but might be even stronger: the converse implication is unknown. 4 The Stanford Encyclopedia of Philosophy entry on “The Philosophy of Computer Science,” plato.stanford.edu/entries/computer-science, devotes most of its space to this connection. 5 A variant, “resource-bounded Kolmogorov complexity,” does take time and memory into account, and is part of computational complexity theory proper. 4

5 would make this essay even longer than it already is. Third, I lack requisite background. And fourth, my impression is that philosophers—at least philosophers—are already more aware some of these other connections than they are of the computational complexity connections that I want to explain. 2 Complexity 101 Computational complexity theory is a huge, sprawling field; naturally this essay will only touch on small parts of it. Readers who want to delve deeper into the subject are urged to consult one of the many outstanding textbooks, such as those of Sipser [124], Papadimitriou [101], Moore and Mertens [96], Goldreich [63], or Arora and Barak [15]; or survey articles by Wigderson [137, 138], Fortnow and Homer [59], or Stockmeyer [127]. One might think that, once we know something is , whether it takes 10 seconds or computable 20 seconds to compute is obviously the concern of engineers rather than philosophers. But that 10 10 be so obvious, if the question were one of 10 seconds versus 10 seconds! conclusion would not And indeed, in complexity theory, the quantitative gaps we care about are usually so vast that one has to consider them qualitative gaps as well. Think, for example, of the difference between reading such book, or between writing down a thousand-digit a 400-page book and reading every possible number and counting to that number. More precisely, complexity theory asks the question: how do the resources needed to solve 2 of the problem size: “reasonably” (like n a problem scale with some measure n n , say), or or n or n !)? As an example, two n -digit integers can be multiplied using “unreasonably” (like 2 2 n computational steps (by the grade-school method), or even ∼ n log n log log n steps (by more ∼ advanced methods [114]). Either method is considered efficient. By contrast, the fastest known 1 / 3 n -digit integer into primes—uses ∼ 2 steps, method for the reverse operation— factoring an n 6 which is considered inefficient. Famously, this conjectured gap between the inherent difficulties of multiplying and factoring is the basis for most of the cryptography currently used on the Internet. Theoretical computer scientists generally call an algorithm “efficient” if its running time can be upper-bounded by any polynomial function of , and “inefficient” if its running time can be n 7 . These criteria have the great advantage of lower-bounded by any exponential function of n theoretical convenience. While the exact complexity of a problem might depend on “low-level encoding details,” such as whether our Turing machine has one or two memory tapes, or how the inputs are encoded as binary strings, where a problem falls on the polynomial/exponential 8 dichotomy can be shown to be independent of almost all such choices. Equally important are the closure properties of polynomial and exponential time: a polynomial-time algorithm that calls a polynomial-time subroutine still yields an overall polynomial-time algorithm, while a polynomial- 6 number field sieve , and the quoted running time depends on plausible but unproved This method is called the √ n running time is ∼ conjectures in number theory. The best . Both of these represent nontrivial improve- 2 proven n 2 steps. See Pomerance [106] for a good ments over the na ̈ıve method of trying all possible divisors, which takes ∼ survey of factoring algorithms. n 7 In some contexts, “exponential” means c for some constant c > 1, but in most complexity-theoretic contexts it d n can also mean c for constants c > 1 and d > 0. 8 This is not to say that no details of the computational model matter: for example, some problems are known to be solvable in polynomial time on a quantum computer, but not known to be solvable in polynomial time on a classical computer! But in my view, the fact that the polynomial/exponential distinction can “notice” a modelling choice of this magnitude is a feature of the distinction, not a bug. 5

6 time algorithm that calls an exponential-time subroutine (or vice versa) yields an exponential-time algorithm. There are also more sophisticated reasons why theoretical computer scientists focus on log n 2 n n time); we’ll explore some of those reasons in polynomial time (rather than, say, time or Section 5.1. The polynomial/exponential distinction is open to obvious objections: an algorithm that took 10000 n steps would be much faster in practice than an algorithm that took n 00000001 steps! . 1 Furthermore, there are many growth rates that fall between polynomial and exponential, such √ n log log 2 n and 2 n as But empirically, polynomial-time to correspond to “efficient . turned out in practice,” and exponential-time to “inefficient in practice,” so often that complexity theorists Why became comfortable making the identification. the identification works is an interesting question in its own right, one to which we will return in Section 12. A priori , insisting that programs terminate after reasonable amounts of time, that they use reasonable amounts of memory, etc. might sound like relatively-minor amendments to Turing’s notion of computation. In practice, though, these requirements lead to a theory with a completely different character than computability theory. Firstly, complexity has much closer connections with the sciences : it lets us pose questions about (for example) evolution, quantum mechanics, statistical physics, economics, or human language acquisition that would be meaningless from a computability standpoint (since the relevant problems are computable). Complexity also differs all from computability in the diversity of mathematical techniques used: while initially complexity (like computability) drew mostly on mathematical logic, today it draws on probability, number theory, combinatorics, representation theory, Fourier analysis, and nearly every other subject about which yellow books are written. Of course, this contributes not only to complexity theory’s depth but also to its perceived inaccessibility. In this essay, I’ll argue that complexity theory has direct relevance to major issues in philosophy, including syntax and semantics, the problem of induction, and the interpretation of quantum mechanics. Or that, at least, whether complexity theory does or does not have such relevance is an important question for philosophy! My personal view is that complexity will ultimately prove more relevant to philosophy than computability was, precisely because of the rich connections with the sciences mentioned earlier. 3 The Relevance of Polynomial Time Anyone who doubts the importance of the polynomial/exponential distinction needs only ponder how many basic intuitions in math, science, and philosophy already implicitly rely on that distinc- tion. In this section I’ll give three examples. 3.1 The Entscheidungsproblem Revisited The Entscheidungsproblem was the dream, enunciated by David Hilbert in the 1920s, of design- ing a mechanical procedure to determine the truth or falsehood of any well-formed mathematical statement. According to the usual story, Hilbert’s dream was irrevocably destroyed by the work of G ̈odel, Church, and Turing in the 1930s. First, the Incompleteness Theorem showed that no recursively-axiomatizable formal system can encode all and only the true mathematical statements. Second, Church’s and Turing’s results showed that, even if we settle for an incomplete system F , there is still no mechanical procedure to sort mathematical statements into the three categories 6

7 “provable in F F ,” and “undecidable in F .” ,” “disprovable in However, there is a catch in the above story, which was first pointed out by G ̈odel himself, in a 1956 letter to John von Neumann that has become famous in theoretical computer science since its rediscovery in the 1980s (see Sipser [123] for an English translation). Given a formal system (such as Zermelo-Fraenkel set theory), G ̈odel wrote, consider the problem of deciding whether F F with n symbols or fewer. Unlike Hilbert’s original S has a proof in a mathematical statement problem, this “truncated Entscheidungsproblem” is clearly decidable. For, if nothing else, we could n possible bit-strings with n symbols, and always just program a computer to search through all 2 check whether any of them encodes a valid S . The issue is “merely” that this approach F -proof of n takes an astronomical amount of time: if = 1000 (say), then the universe will have degenerated 1000 proofs! into black holes and radiation long before a computer can check 2 But as G ̈odel also pointed out, it’s far from obvious how to that there isn’t a much prove better approach: an approach that would avoid brute-force search, and find proofs of size n in time n . Furthermore: polynomial in 2 ∼ (or even only with ∼ Kn Kn ) If there actually were a machine with [running time] K ], this would have consequences of the greatest n independent of [for some constant magnitude. That is to say, it would clearly indicate that, despite the unsolvability of the Entscheidungsproblem, the mental effort of the mathematician in the case of yes- or-no questions could be completely [added in a footnote: apart from the postulation so large of axioms] replaced by machines. One would indeed have to simply select an n that, if the machine yields no result, there would then also be no reason to think further about the problem. 2 c or ∼ If we replace the “ ∼ ” in G ̈odel’s challenge by ∼ Kn Kn for an arbitrary constant Kn c , then we get precisely what computer science now knows as the P versus NP problem. Here P (Polynomial-Time) is, roughly speaking, the class of all computational problems that are solvable by a polynomial-time algorithm. Meanwhile, NP (Nondeterministic Polynomial-Time) is the class recognized in polynomial time, even though of computational problems for which a solution can be 9 (Think, for example, of factoring a large number, or solving a solution might be very hard to find. P ⊆ NP , so the question is whether the inclusion is strict. If a jigsaw or Sudoku puzzle.) Clearly NP , then the ability to check the solutions to puzzles efficiently would imply the ability to find P = appreciate solutions efficiently. An analogy would be if anyone able to a great symphony could also compose one themselves! Given the intuitive implausibility of such a scenario, essentially all complexity theorists proceed (reasonably, in my opinion) on the assumption that 6 = NP , even if they publicly claim open- P P mindedness about the question. Proving or disproving = NP is one of the seven million-dollar 6 10 Clay Millennium Prize Problems (alongside the Riemann Hypothesis, the Poincar ́e Conjecture 9 Contrary to a common misconception, NP does not stand for “Non-Polynomial”! There are computational problems that are known NP problems are not among to require more than polynomial time (see Section 10), but the . NP P 6 those. Indeed, the classes NP and “Non-Polynomial” have a nonempty intersection exactly if = For detailed definitions of P , NP , and several hundred other complexity classes, see my Complexity Zoo website: www.complexityzoo.com. 10 vs NP/ For more information see www.claymath.org/millennium/P My own view is that P versus NP is manifestly the most important of the seven problems! For if P = NP , then by G ̈odel’s argument, there is an excellent chance that we could program our computers to solve the other six problems as well. 7

8 11 proved in 2002 by Perelman, etc.), which should give some indication of the problem’s difficulty. S has a proof with symbols Now return to the problem of whether a mathematical statement n . A suitable formalization of this problem is easily seen to be in or fewer, in some formal system F a proof might be intractable, but if we’re given a purported proof, we can certainly . For finding NP n whether each line of the proof follows by a simple logical manipulation check in time polynomial in -complete of previous lines. Indeed, this problem turns out to be NP , which means that it belongs to NP an enormous class of problems, first identified in the 1970s, that “capture the entire difficulty of NP .” A few other examples of NP -complete problems are Sudoku and jigsaw puzzles, the Traveling 12 Salesperson Problem, and the satisfiability problem for propositional formulas. Asking whether = P is equivalent to asking whether any NP -complete problem can be solved in polynomial NP time, and is also equivalent to asking whether of them can be. all P NP , then whenever a theorem had a proof In modern terms, then, G ̈odel is saying that if = of reasonable length, we could find that proof in a reasonable amount of time. In such a situation, we might say that “for all practical purposes,” Hilbert’s dream of mechanizing mathematics had prevailed, despite the undecidability results of G ̈odel, Church, and Turing. If you accept this, then P it seems fair to say that until NP is solved, the story of Hilbert’s Entscheidungsproblem—its versus rise, its fall, and the consequences for philosophy—is not yet over. 3.2 Evolvability Creationists often claim that Darwinian evolution is as vacuous an explanation for complex adap- tations as “a tornado assembling a 747 airplane as it passes through a junkyard.” Why is this claim false? There are several related ways of answering the question, but to me, one of the most illuminating is the following. In principle, one could see a 747 assemble itself in a tornado-prone junkyard—but before that happened, one would need to wait for an expected number of tornadoes that grew exponentially with the number of pieces of self-assembling junk. (This is similar to how, n will eventually congregate themselves in one corner in thermodynamics, gas particles in a box n c c time for some constant of the box, but only after .) By contrast, evolutionary processes ∼ can often be observed in simulations—and in some cases, even proved theoretically [108]—to find interesting solutions to optimization problems after a number of steps that grows only polynomially with the number of variables. Interestingly, in a 1972 letter to Hao Wang (see [134, p. 192]), Kurt G ̈odel expressed his own doubts about evolution as follows: I believe that mechanism in biology is a prejudice of our time which will be disproved. In this case, one disproof, in my opinion, will consist in a mathematical theorem to the effect that the formation within geological time of a human body by the laws of 11 One might ask: can we explain what makes the P 6 = NP problem so hard, rather than just pointing out that many smart people have tried to solve it and failed? After four decades of research, we do have partial explanations for the problem’s difficulty, in the form of formal “barriers” that rule out large classes of proof techniques. Three barriers identified so far are [21] (which rules out diagonalization and other techniques with a “computability” relativization algebrization [8] (which rules out diagonalization even when combined with the main non-relativizing tech- flavor), natural proofs [110] (which shows that many “combinatorial” techniques, if they worked, niques known today), and could be turned around to get faster algorithms to distinguish random from pseudorandom functions). 12 By contrast, and contrary to a common misconception, there is strong evidence that factoring integers is not NP NP P 6 = NP , then there are -complete. It is known that if problems that are neither in P nor NP -complete [86], and factoring is one candidate for such a problem. This point will become relevant when we discuss quantum computing. 8

9 physics (or any other laws of similar nature), starting from a random distribution of the elementary particles and the field, is as unlikely as the separation by chance of the atmosphere into its components. Personally, I see no reason to accept G ̈odel’s intuition on this subject over the consensus of modern biology! But pay attention to G ̈odel’s characteristically-careful phrasing. He does not ask form a human body (for he knows that it can, given exponential eventually whether evolution can time); instead, he asks whether it can do so on a “merely” geological timescale. Just as G ̈odel’s NP letter to von Neumann anticipated the versus P problem, so G ̈odel’s letter to Wang might be said to anticipate a recent effort, by the celebrated computer scientist Leslie Valiant, to construct a quantitative “theory of evolvability” [132]. Building on Valiant’s earlier work in computational learning theory (discussed in Section 7), evolvability tries to formalize and answer questions about of evolution. For example: “what sorts of adaptive behaviors can evolve, with high the speed probability, after only a polynomial number of generations? what sorts of behaviors can be learned in polynomial time, but not via evolution?” While there are some interesting early results, it should surprise no one that evolvability is nowhere close to being able to calculate, from first principles, whether four billion years is a “reasonable” or “unreasonable” length of time for the human brain to evolve out of the primordial soup. As I see it, this difficulty reflects a general point about G ̈odel’s “evolvability” question. Namely, even G ̈odel was right, that the mechanistic worldview of modern biology was “as unlikely supposing as the separation by chance of the atmosphere into its components,” computational complexity theory seems hopelessly far from being able to anything of the kind! In 1972, one could prove have argued that this merely reflected the subject’s newness: no one had thought terribly deeply lower bounds on computation time. But by now, people have thought yet about how to prove deeply about it, and have identified huge obstacles to proving even such “obvious” and well-defined 13 6 = NP P conjectures as (Section 4 will make a related point, about the difficulty of proving . nontrivial lower bounds on the time or memory needed by a computer program to pass the Turing Test.) 3.3 Known Integers My last example of the philosophical relevance of the polynomial/exponential distinction concerns 14 the concept of “knowledge” in mathematics. As of 2011, the “largest known prime number,” 15 43112609 is p − 1. But as reported by GIMPS (the Great Internet Mersenne Prime Search), := 2 p is “known”? Do we mean that, if we desired, on reflection, what do we mean by saying that , 000 pages)? That seems like too we could literally print out its decimal digits (using about 30 k together with a proof that q = 2 restrictive a criterion. For, given a positive integer − 1 was k 16 q a “known” prime, prime, I doubt most mathematicians would hesitate to call even if k were so large that printing out its decimal digits (or storing them in a computer memory) were beyond the 13 Admittedly, one might be able to prove that Darwinian natural selection would require exponential time to produce some functionality, without thereby proving that any algorithm would require exponential time. 14 This section was inspired by a question of A. Rupinski on the website MathOverflow . See mathoverflow.net/questions/62925/philosophical-question-related-to-largest-known-primes/ 15 www.mersenne.org 16 Here we implicitly mean: “known” by the entire mathematical community, rather than known by some particular individual when asked about it. Section 5 will consider the latter type of knowledge. 9

10 1000 2 Earth’s capacity. Should we call 2 an “unknown power of 2,” just because it has too many decimal digits to list before the Sun goes cold? matter, one feels, is that All that should really 43112609 − 1’ picks out a unique positive integer, and (a) the expression ‘2 (b) that integer has been proven (in this case, via computer, of course) to be prime. But wait! If those are the criteria, then why can’t we immediately beat the largest-known-prime record, like so? ′ 43112609 − 1 = The first prime larger than 2 p . ′ p exists, it is unambiguously defined, and it is prime. If we want, we can even write Clearly ′ a program that is guaranteed to find p and output its decimal digits, using a number of steps 17 43112609 . a priori that can be upper-bounded − 1 is a Yet our intuition stubbornly insists that 2 ′ p is not. Is there any principled basis for such a distinction? “known” prime in a sense that The clearest basis that I can suggest is the following. We know an algorithm that takes as k , and that outputs the decimal digits of using a number of = 2 k − 1 input a positive integer p p steps that is polynomial—indeed, linear—in the number of digits of . But we do not know any k 18 similarly-efficient algorithm that provably outputs the first prime larger than 2 − 1. 3.4 Summary The point of these examples was to illustrate that, beyond its utility for theoretical computer science, the polynomial/exponential gap is also a fertile territory for philosophy. I think of the polynomial/exponential gap as occupying a “middle ground” between two other sorts of gaps: on the one hand, small quantitative gaps (such as the gap between steps and 2 n steps); and on the n other hand, the gap between a finite number of steps and an infinite number. The trouble with small quantitative gaps is that they are too sensitive to “mundane” modeling choices and the details of technology. But the gap between finite and infinite has the opposite problem: it is serenely in sensitive to distinctions that we actually care about, such as that between finding a solution and 19 verifying it, or between classical and quantum physics. The polynomial/exponential gap avoids both problems. 4 Computational Complexity and the Turing Test Can a computer think? For almost a century, discussions about this question have often conflated two issues. The first is the “metaphysical” issue: 17 For example, one could use Chebyshev’s Theorem Bertrand’s Postulate ), which says that for all N > 1 (also called there exists a prime between N and 2 N . 18 2 states that the spacing between two consecutive n -digit primes never exceeds ∼ n . This Cram ́er’s Conjecture conjecture appears staggeringly difficult: even assuming the Riemann Hypothesis, it is only known how to deduce 2 n/ n ∼ the much weaker upper bound . But interestingly, if Cram ́er’s Conjecture is proved, expressions like “the 2 k then − 1” will first prime larger than 2 define “known primes” according to my criterion. 19 In particular, it is easy to check that the set of computable functions does not depend on whether we define computability with respect to a classical or a quantum Turing machine, or a deterministic or nondeterministic one. At most, these choices can change a Turing machine’s running time by an exponential factor, which is irrelevant for computability theory. 10

11 Supposing a computer program passed the Turing Test (or as strong a variant of the 20 would we be right to ascribe to it “consciousness,” Turing Test as one wishes to define), “qualia,” “aboutness,” “intentionality,” “subjectivity,” “personhood,” or whatever other charmed status we wish to ascribe to other humans and to ourselves? The second is the “practical” issue: Could a computer program that passed (a strong version of) the Turing Test actually be written? Is there some fundamental reason why it couldn’t be? Of course, it was precisely in an attempt to separate these issues that Turing proposed the But despite his efforts, a familiar feature of anti-AI arguments Turing Test in the first place! to this day is that they first assert AI’s metaphysical impossibility, and then try to bolster that position with claims about AI’s practical difficulties. “Sure,” they say, “a computer program might mimic a few minutes of witty banter, but unlike a human being, it would never show fear or anger or jealousy, or compose symphonies, or grow old, or fall in love...” The obvious followup question—and what if a program did do all those things?—is often left unasked, or else answered by listing more things that a computer program could self-evidently never do. Because of this, I suspect that many people who say they consider AI a metaphysical impossibility, really consider it only a practical impossibility: they simply have not carried the 21 requisite thought experiment far enough to see the difference between the two. Incidentally, this is as clear-cut a case as I know of where people would benefit from studying more philosophy! Thus, the anti-AI arguments that interest me most have always been the ones that target the practical issue from the outset, by proposing empirical “sword-in-the-stone tests” (in Daniel Dennett’s phrase [46]) that it is claimed humans can pass but computers cannot. The most famous such test is probably the one based on G ̈odel’s Incompleteness Theorem, as proposed by John Lucas [92] and elaborated by Roger Penrose in his books The Emperor’s New Mind [103] and Shadows of the Mind [104]. Briefly, Lucas and Penrose argued that, according to the Incompleteness Theorem, one thing that a computer making deductions via fixed formal rules can never do is to “see” the consistency of can its own rules. Yet this, they assert, is something that human mathematicians do, via some sort of intuitive perception of Platonic reality. Therefore humans (or at least, human mathematicians!) can never be simulated by machines. 22 Critics pointed out numerous holes in this argument, to which Penrose responded at length Shadows of the Mind , in my opinion unconvincingly. However, even before we analyze some in 20 The Turing Test, proposed by Alan Turing [130] in 1950, is a test where a human judge interacts with either another human or a computer conversation program, by typing messages back and forth. The program “passes” the Test if the judge can’t reliably distinguish the program from the human interlocutor. By a “strong variant” of the Turing Test, I mean that besides the usual teletype conversation, one could add additional tests requiring vision, hearing, touch, smell, speaking, handwriting, facial expressions, dancing, playing sports and musical instruments, etc.—even though many perfectly-intelligent humans would then be unable to pass the tests! 21 One famous exception is John Searle [115], who has made it clear that, if (say) his best friend turned out to be controlled by a microchip rather than a brain, then he would regard his friend as never having been a person at all. 22 See Dennett [46] and Chalmers [37] for example. To summarize: (1) Why should we assume a computer operates within a knowably-sound formal system? If we grant a computer the same freedom to make occasional mistakes that we grant humans, then the Incompleteness Theorem is no longer relevant. 11

12 proposed sword-in-the-stone test, it seems to me that there is a much more basic question. Namely, what does one even in saying one has a task that “humans can perform but computers mean cannot”? 4.1 The Lookup-Table Argument There is a fundamental difficulty here, which was noticed by others in a slightly different context [30, 102, 88, 118]. Let me first explain the difficulty, and then discuss the difference between my argument and the previous ones. In practice, people judge each other to be conscious after interacting for a very short time, perhaps as little as a few seconds. This suggests that we can put a finite upper bound—to be 20 A and generous, let us say 10 would ever B —on the number of bits of information that two people 23 had amassed enough evidence to conclude B was conscious. Now A realistically exchange, before H of A and B imagine a lookup table that stores every possible history ’s conversation, and next to H f , the action ( H ) that B would take next given that history. Of course, like Borges’ Library B of Babel, the lookup table would consist almost entirely of meaningless nonsense, and it would also be much too large to fit inside the observed universe. But all that matters for us is that the lookup finite , by the assumption that there is a finite upper bound on the conversation table would be f length. This implies that the function is computable (indeed, it can be recognized by a finite B automaton!). From these simple considerations, we conclude that if there is a fundamental obstacle 24 to computers passing the Turing Test, then it is not to be found in computability theory. In Shadows of the Mind [104, p. 83], Penrose recognizes this problem, but gives a puzzling and unsatisfying response: One could equally well envisage computers that contain nothing but lists of totally false mathematical ‘theorems,’ or lists containing random jumbles of truths and falsehoods. How are we to tell which computer to trust? The arguments that I am trying to make here do not say that an effective simulation of the output of conscious human activity (2) Why should we assume that human mathematicians have “direct perception of Platonic reality”? Human mathematicians (such as Frege) have been wrong before about the consistency of formal systems. (3) A computer could, of course, be programmed to output “I believe that formal system F is consistent”—and why it believes this. So in arguing that such even to output answers to various followup questions about affirmations “wouldn’t really count” (because they wouldn’t reflect “true understanding”), AI critics such as Lucas and Penrose are forced to retreat from their vision of an empirical “sword-in-the-stone test,” and fall why put the sword in the back on other, unspecified criteria related to the AI’s internal structure. But then stone in the first place? 23 People interacting over the Internet, via email or instant messages, regularly judge each other to be humans rather than spam-bots after exchanging a much smaller number of bits! In any case, cosmological considerations 122 bits in any observable process [34]. suggest an upper bound of roughly 10 24 Some readers might notice a tension here: I explained in Section 2 that complexity theorists care about the asymptotic behavior as the problem size n goes to infinity. So why am I now saying that, for the purposes of 20 the Turing Test, we should restrict attention to finite values of n ? There are two answers to this such as 10 question. The first is that, in contrast to mathematical problems like the factoring problem or the halting problem, it is unclear whether it even makes sense to generalize the Turing Test to arbitrary conversation lengths: for the Turing Test is defined in terms of human beings, and human conversational capacity is finite. The second answer is that, to whatever extent it does make sense to generalize the Turing Test to arbitrary conversation lengths n , I am interested in whether the asymptotic complexity of passing the test grows polynomially or exponentially with n (as the remainder of the section explains). 12

13 (here mathematics) is impossible, since purely by chance the computer might ‘happen’ to get it right—even without any understanding whatsoever. But the odds against this are absurdly enormous, and the issues that are being addressed here, namely how one decides which mathematical statements are true and which are false, are not even being touched... The trouble with this response is that it amounts to a retreat from the sword-in-the-stone test, back to murkier internal criteria. If, in the end, we are going to have to look inside the then why not dispense computer anyway to determine whether it truly “understands” its answers, with computability theory from the beginning? For computability theory only addresses whether to solve various problems, and we have already seen that that is not or not Turing machines exist the relevant issue. one direction that Penrose could take from this point to avoid incoherence— To my mind, there is though disappointingly, it is not the direction he chooses. Namely, he could point out that, while the lookup table “works,” it requires computational resources that grow exponentially with the length of the conversation! This would lead to the following speculation: Any (*) computer program that passed the Turing Test would need to be exponentially- inefficient in the length of the test—as measured in some resource such as time, memory usage, or the number of bits needed to write the program down. In other words, the 25 astronomical lookup table is essentially the best one can do. If true, speculation (*) would do what Penrose wants: it would imply that the human brain can’t even be simulated by computer, within the resource constraints of the observable universe. Furthermore, unlike the earlier computability claim, (*) has the advantage of not being trivially false! On the other hand, to put it mildly, (*) is not trivially either. For AI proponents, the lack true of compelling evidence for (*) is hardly surprising. After all, if you believe that the brain itself is 26 basically an efficient, classical Turing machine, then you have a simple explanation for why no one has proved that the brain can’t be simulated by such a machine! However, complexity theory also makes it clear that, even if we supposed (*) held , there would be little hope of proving it in our current state of mathematical knowledge. After all, we can’t even prove plausible, well-defined conjectures such as 6 = NP . P 4.2 Relation to Previous Work As mentioned before, I’m far from the first person to ask about the used in computational resources passing the Turing Test, and whether they scale polynomially or exponentially with the conversation length. While many writers ignore this crucial distinction, Block [30], Parberry [102], Levesque 25 As Gil Kalai pointed out to me, one could speculate instead that an efficient computer program to pass the exists Turing Test, but that finding such a program would require exponential computational resources. In that situation, the human brain could indeed be simulated efficiently by a computer program, but maybe not by a program that humans could ever write ! 26 being “efficient,” we mean that M ’s running time, memory usage, and program size M Here, by a Turing machine M could be simulated by a classical are modest enough that there is no real problem of principle understanding how 11 14 10 physical system consisting of neurons and ∼ 10 ∼ synapses. For example, a Turing machine containing a 20 10 lookup table of size 10 would not be efficient in this sense. 13

14 [88], Shieber [118], and several others all discussed it explicitly. The main difference is that the previous discussions took place in the context of Searle’s Chinese Room argument [115]. Briefly, Searle proposed a thought experiment—the details don’t concern us here—purporting to show that a computer program could pass the Turing Test, even though the program manifestly lacked anything that a reasonable person would call “intelligence” or “understanding.” (Indeed, physical system can understand anything “purely by virtue of” the compu- Searle argues that no In response, many critics said that Searle’s argument was deeply tations that it implements.) misleading, because it implicitly encouraged us to imagine a computer program that was simplistic in its internal operations—something like the giant lookup table described in Section 4.1. And while it was true, the critics went on, that a giant lookup table wouldn’t “truly understand” its . For the giant lookup table is a philosophical fiction anyway: responses, that point is also irrelevant compact, efficient something that can’t even fit in the observable universe! If we instead imagine a computer program passing the Turing Test, then the situation changes drastically. For now, in order to explain how the program can be so compact and efficient, we’ll need to posit that the program includes representations of abstract concepts, capacities for learning and reasoning, and all sorts of other internal furniture that we would expect to find in a mind. Personally, I find this response to Searle extremely interesting—since if correct, it suggests that the distinction between polynomial and exponential complexity has significance. metaphysical According to this response, an exponential-sized lookup table that passed the Turing Test would not be sentient (or conscious, intelligent, self-aware, etc.), but a polynomially-bounded program with exactly the same input/output behavior be sentient. Furthermore, the latter program would would be sentient because it was polynomially-bounded. Yet, as much as that criterion for sentience flatters my complexity-theoretic pride, I find myself reluctant to take a position on such a weighty matter. My point, in Section 4.1, was a simpler and (hopefully) less controversial one: namely, that if you want to claim that passing the Turing Test is , then like it or not, you must talk about complexity rather than just flat-out impossible computability. In other words, the previous writers [30, 102, 88, 118] and I are all interested in the computational resources needed to pass a Turing Test of length n , but for different reasons. Where others invoked complexity considerations to argue with Searle about the metaphysical question, I’m invoking them to argue with Penrose about the practical question. 4.3 Can Humans Solve NP -Complete Problems Efficiently? say In that case, what can we actually about the practical question? Are there any reasons to accept the claim I called (*)—the claim that humans are not efficiently simulable by Turing machines? In considering this question, we’re immediately led to some speculative possibilities. So for example, it turned out that humans could solve arbitrary instances of NP -complete problems in polynomial if 27 time, then that would certainly constitute excellent empirical evidence for (*). However, despite can solve occasional claims to the contrary, I personally see no reason to believe that humans - NP 28 complete problems in polynomial time, and excellent reasons to believe the opposite. Recall, for 27 And amusingly, if we could solve -complete problems, then we’d presumably find it much easier to prove that NP computers couldn’t solve them! 28 Indeed, it is not even clear to me that we should think of humans as being able to solve all P problems efficiently, let alone NP -complete problems! Recall that P is the class of problems that are solvable in polynomial time by a deterministic Turing machine. Many problems are known to belong to P for quite sophisticated reasons: two examples are testing whether a number is prime (though not factoring it!) [9] and testing whether a graph has a 14

15 example, that the integer factoring problem is in NP NP -complete . Thus, if humans could solve problems, then presumably we ought to be able to factor enormous numbers as well! But factoring does not exactly seem like the most promising candidate for a sword-in-the-stone test: that is, a task that’s easy for humans but hard for computers. As far as anyone knows today, factoring is hard , although with a definite advantage on the computers’ for humans and (classical) computers alike side! The basic point can hardly be stressed enough: when complexity theorists talk about “in- tractable” problems, they generally mean mathematical problems that all our experience leads us to believe are at least as hard for humans as for computers. This suggests that, even if humans were not efficiently simulable by Turing machines, the “direction” in which they were hard to simu- late would almost certainly be different from the directions usually considered in complexity theory. I see two (hypothetical) ways this could happen. First, the tasks that humans were uniquely good at—like painting or writing poetry—could be incomparable with mathematical tasks like solving NP -complete problems, in the sense that neither was efficiently reducible to the other. This would mean, in particular, that there could recognize great art or poetry (since if such an algorithm be no polynomial-time algorithm even to composing NP ). Within complexity existed, then the task of great art or poetry would be in theory, it’s known that there exist pairs of problems that are incomparable in this sense. As one plausible example, no one currently knows how to reduce the simulation of quantum computers to NP -complete problems the solution of vice versa. or Second, humans could have the ability to solve interesting special cases of NP -complete problems faster than any Turing machine. So for example, even if computers were better than humans at factoring large numbers or at solving randomly-generated Sudoku puzzles, humans might still be better at search problems with “higher-level structure” or “semantics,” such as proving Fermat’s Last Theorem or (ironically) designing faster computer algorithms. Indeed, even in limited domains such as puzzle-solving, while computers can examine solutions millions of times faster, humans (for now) are vastly better at noticing or symmetries in the puzzle that make a solution global patterns Pigeonhole Principle either trivial or impossible. As an amusing example, consider the , which says n + 1 pigeons can’t be placed into n holes, with at most one pigeon per hole. It’s not hard to that φ that encodes the Pigeonhole Principle for some fixed construct a propositional Boolean formula n (say, 1000). However, if you then feed value of to current Boolean satisfiability algorithms, φ they’ll assiduously set to work trying out possibilities: “let’s see, if I put this pigeon here, and that one there ... darn, it still doesn’t work!” And they’ll continue trying out possibilities for an exponential number of steps, oblivious to the “global” reason why the goal can never be achieved. proof complexity —a close cousin of computational Indeed, beginning in the 1980s, the field of complexity—has been able to show that large classes of algorithms require exponential time to prove the Pigeonhole Principle and similar propositional tautologies (see Beame and Pitassi [24] for a survey). Still, if we want to build our sword-in-the-stone test on the ability to detect “higher-level patterns” in combinatorial search problems, then the burden is on us to explain what we mean by higher-level patterns, and why we think that no polynomial-time Turing machine—even much perfect matching. In principle, of course, a human could laboriously run the polynomial-time algorithms for such problems using pencil and paper. But is the use of pencil and paper legitimate, where use of a computer would not be? What is the computational power of the “unaided” human intellect? Recent work of Drucker [51], which shows how to use a stock photography collection to increase the “effective memory” available for mental calculations, provides a fascinating empirical perspective on these questions. 15

16 more sophisticated ones than we can imagine today—could ever detect those patterns as well. For an initial attempt to understand -complete problems from a cognitive science perspective, see NP Baum [22]. 4.4 Summary My conclusion is that, if you oppose the possibility of AI in principle, then either (i) you can take the “metaphysical route” (as Searle [115] does with the Chinese Room), con- ceding the possibility of a computer program passing every conceivable empirical test for intelligence, but arguing that that isn’t enough, or (ii) you can conjecture an astronomical lower bound on the resources needed either to run such a program or to write it in the first place—but here there is little question of proof for the foreseeable future. Crucially, because of the lookup-table argument, one option you do not have is to assert the flat- out impossibility of a computer program passing the Turing Test, with no mention of quantitative complexity bounds. 5 The Problem of Logical Omniscience Giving a formal account of is one of the central concerns in modern analytic philosophy; knowledge the literature is too vast even to survey here (though see Fagin et al. [54] for a computer-science- friendly overview). Typically, formal accounts of knowledge involve conventional “logical” axioms, such as • If you know P and you know Q , then you also know P ∧ Q supplemented by “modal” axioms having to do with knowledge itself, such as • P , then you also know that you know P If you know 29 If you don’t know P • P , then you know that you don’t know While the details differ, what most formal accounts of knowledge have in common is that they treat an agent’s knowledge as closed under the application of various deduction rules like the ones above. In other words, agents are considered logically omniscient : if they know certain facts, then they also know all possible logical consequences of those facts. Sadly and obviously, no mortal being has ever attained or even approximated this sort of omniscience (recall the Turing quote from the beginning of Section 1). So for example, I can know the rules of arithmetic without knowing Fermat’s Last Theorem, and I can know the rules of chess without knowing whether White has a forced win. Furthermore, the difficulty is not (as sometimes claimed) limited to a few domains, such as mathematics and games. As pointed out by Stalnaker [126], if we assumed logical omniscience, then we couldn’t account for any contemplation of facts 29 Not surprisingly, these particular axioms have engendered controversy: they leave no possibility for Rumsfeldian “unknown unknowns,” or (a category that he left out) “unknown knowns.” 16

17 already known to us—and thus, for the main activity and one of the main subjects of philosophy itself! problem of logical omniscience : We can now loosely state what Hintikka [73] called the Can we give some formal account of “knowledge” able to accommodate people learning new things without leaving their armchairs? Of course, one vacuous “solution” would be to declare that your knowledge is simply a list of all 30 that you “know”—and that, if the list happens not to be closed under logical the true sentences how deductions, so be it! why you know But this “solution” is no help at all at explaining or things. Can’t we do better? Intuitively, we want to say that your “knowledge” consists of various facts (“grass is green”), some simple logical consequences of those facts (“grass is not pink”), but not neces- together with all sarily the consequences, and certainly not all consequences that involve difficult mathematical reasoning. Unfortunately, as soon as we try to formalize this idea, we run into problems. The most obvious problem is the lack of a sharp boundary between the facts you know right away, and those you “could” know, but only after significant thought. (Recall the discussion of “known primes” from Section 3.3.) A related problem is the lack of a sharp boundary between the facts you know “only if asked about them,” and those you know even if you’re not asked. Interestingly, these two boundaries seem to cut across each other. For example, while you’ve probably already encountered the fact that 91 is composite, it might take you some time to remember it; while you’ve never encountered the fact that 83190 is composite, once asked you can probably assent probably to it immediately. But as discussed by Stalnaker [126], there’s a third problem that seems much more serious than either of the two above. Namely, you might “know” a particular fact if asked about it one way, but not if asked in a different way! To illustrate this, Stalnaker uses an example that we can recognize immediately from the discussion of the P versus NP problem in Section 3.1. If I asked you whether 2 2 43 3) = 40 × − 3 − ). On 37 = 1591, you could probably answer easily (e.g., by using (40 + 3) (40 31 the other hand, if I instead asked you what the prime factors couldn’t of 1591 were, you probably answer so easily. But the answers to the two questions have the same content, even on a very fine- grained notion of content. Suppose that we fix the threshold of accessibility so that the information that 43 and 37 are the prime factors of 1591 is accessible in response to the second question, but not accessible in response to the first. Do you know what the prime factors of 1591 are or not? ... Our problem is that we are not just trying to say what an agent would know upon being asked certain questions; rather, we are trying to use the facts about an agent’s question answering capacities in order to get at what the agent knows, even if the questions are not asked. [126, p. 253] To add another example: does a typical four-year-old child “know” that addition of reals is commutative? Certainly not if we asked her in those words—and if we tried to explain the words, she probably wouldn’t understand us. Yet if we showed her a stack of books, and asked her 30 If we don’t require the sentences to be true , then presumably we’re talking about belief rather than knowledge . 31 If you lack the concept of a prime factor, then I could simply ask instead for two 2-digit numbers that yield 1591 when multiplied. 17

18 whether she could make the stack higher by shuffling the books, she probably wouldn’t make a mistake that involved imagining addition was non-commutative. In that sense, we might say she already “implicitly” knows what her math classes will later make explicit. In my view, these and other examples strongly suggest that only a small part of what we mean by “knowledge” is knowledge about the truth or falsehood of individual propositions. And crucially, this remains so even if we restrict our attention to “purely verbalizable” knowledge— knowledge used for answering factual questions —and not (say) knowledge of how to ride a indeed, 32 bike or swing a golf club, or knowledge of a person or a place. Many everyday uses of the word “know” support this idea: Do you know calculus? Do you know Spanish? Do you know the rules of bridge? Each of the above questions could be interpreted as asking: do you possess an internal algorithm, by which you can answer a large (and possibly-unbounded) set of questions of some form? While this is rarely made explicit, the examples of this section and of Section 3.3 suggest adding the . . . answer in a reasonable amount of time? proviso: But suppose we accept that “knowing how” (or “knowing a good algorithm for”) is a more fundamental concept than “knowing that.” How does that help us in solving the logical at all omniscience problem? You might worry that we’re right back where we started. After all, if we try to give a formal account of “knowing how,” then just like in the case of “knowing that,” it will be tempting to write down axioms like the following: f If you know how to compute x ) and g ( x ) efficiently, then you also know how to ( compute f ( x ) + g ( x ) efficiently. Naturally, we’ll then want to take the logical closure of those axioms. But then, before we know it, won’t we have conjured into our imaginations a computationally-omniscient superbeing, who could efficiently compute anything at all? 5.1 The Cobham Axioms can write down reasonable axioms for Happily, the above worry turns out to be unfounded. We “knowing how to compute efficiently,” and then go ahead and take the closure of those axioms , without getting the unwanted consequence of computational omniscience. Explaining this point will involve a digression into an old and fascinating corner of complexity theory—one that probably holds independent interest for philosophers. As is well-known, in the 1930s Church and Kleene proposed definitions of the “computable functions” that turned out to be precisely equivalent to Turing’s definition, but that differed from Turing’s in making no explicit mention of machines. Rather than analyzing the process of com- putation, the Church-Kleene approach was simply to list axioms that the computable functions of natural numbers f : N → N ought to satisfy—for example, “if f ( x ) and g ( x ) are both computable, 32 For “knowing” a person suggests having actually met the person, while “knowing” a place suggests having visited the place. Interestingly, in Hebrew, one uses a completely different verb for “know” in the sense of “being familiar with” ( makir ) than for “know” in the intellectual sense ( yodeya ). 18

19 then so is f ( x ))”—and then to define “the” computable functions as the smallest set satisfying ( g those axioms. efficiently or In 1965, Alan Cobham [42] asked whether the same could be done for the feasibly computable functions. As an answer, he offered axioms that precisely characterize what today we , or Function Polynomial-Time (though Cobham called it ). The class FP consists of all FP L call N → functions of natural numbers that are computable in polynomial time by a deterministic f : N is “morally” the same as the class P (Polynomial-Time) defined FP Turing machine. Note that is a class of decision problems (or equivalently, functions in Section 3.1: they differ only in that P N : 0 , 1 } ), whereas FP is a class of functions with integer range. f →{ What was noteworthy about Cobham’s characterization of polynomial time was that it didn’t any involve explicit mention of either computing devices or bounds on their running time. Let me now list a version of Cobham’s axioms, adapted from Arora, Impagliazzo, and Vazirani [16]. : N → Each of the axioms talks about which functions of natural numbers are “efficiently f N computable.” (1) Every constant function f is efficiently computable, as is every function which is nonzero only finitely often. Pairing: If f ( x ) and g ( x ) are efficiently computable, then so is 〈 f ( x ) ,g ( x ) 〉 , where 〈 , 〉 is (2) some standard pairing function for the natural numbers. (3) f ( x ) and g ( x ) are efficiently computable, then so is If ( g ( x )). Composition: f Grab Bag: The following functions are all efficiently computable: (4) the arithmetic functions x + y and x × y • • | x = b log | x c + 1 (the number of bits in x ’s binary representation) 2 x • ( 〈 x,y 〉 ) = the projection functions Π and Π ( 〈 x,y 〉 ) = y 1 2 th • x,i 〉 ) (the i bit ( bit of x ’s binary representation, or 0 if i > | x | ) 〈 th diff ( 〉 ) (the number obtained from x by flipping its i x,i bit) • 〈 2 | x | 2 (called the “smash function”) • ) Bounded Recursion: f ( x ) is efficiently computable, and | f ( x (5) |≤| x | for all x ∈ N . Suppose Then the function g ( 〈 x,k 〉 ), defined by { x, f ( g ( 〈 k/ b 2 c〉 )) if k > 1 g x,k 〉 ) = 〈 , ( if k = 1 x is also efficiently computable. A few comments about the Cobham axioms might be helpful. First, the axiom that “does most of the work” is (5). Intuitively, given any natural number k ∈ N that we can generate starting from the original input ∈ N , the Bounded Recursion axiom lets us set up a “computational x 2 | x | process” that runs for log , is to let us map k steps. Second, the role of the “smash function,” 2 2 4 2 -bit integers and so on, and thereby (in combination with the n -bit integers to n n -bit integers to Bounded Recursion axiom) set up computational processes that run for arbitrary polynomial num- bers of steps. Third, although addition and multiplication are included as “efficiently computable 19

20 functions,” it is crucial that exponentiation is not x and y are n -bit integers, included. Indeed, if y x then might require exponentially many bits just to write down. The basic result is then the following: computable in polynomial time by , of functions f : N Theorem 1 ([42, 112]) N FP The class → a deterministic Turing machine, satisfies axioms (1)-(5), and is the smallest class that does so. To prove Theorem 1, one needs to do two things, neither of them difficult: first, show that any function f that can be defined using the Cobham axioms can also be computed in polynomial time; and second, show that the Cobham axioms are enough to simulate any polynomial-time Turing machine. One drawback of the Cobham axioms is that they seem to “sneak in the concept of polynomial- time through the back door”—both through the “smash function,” and through the arbitrary- | f ( x ) | ≤ | x | in axiom (5). In the 1990s, however, Leivant [87] and Bellantoni looking condition FP that avoid this problem. and Cook [25] both gave more “elegant” logical characterizations of f f FP , if and only if So for example, Leivant showed that a function is computed by a belongs to program that can be proved correct in second-order logic with comprehension restricted to positive quantifier-free formulas. Results like these provide further evidence—if any was needed—that polynomial-time computability is an extremely natural notion: a “wide target in conceptual space” that one hits even while aiming in purely logical directions. Over the past few decades, the idea of defining complexity classes such as P and NP in “logical, machine-free” ways has given rise to an entire field called descriptive complexity theory , which has While further discussion of descriptive complexity deep connections with finite model theory. theory would take us too far afield, see the book of Immerman [78] for the definitive introduction, or Fagin [52] for a survey. 5.2 Omniscience Versus Infinity Returning to our original topic, how exactly do axiomatic theories such as Cobham’s (or Church’s and Kleene’s, for that matter) escape the problem of omniscience? One straightforward answer is countably infinite, the that, unlike the set of true sentences in some formal language, which is only f : N → N is uncountably infinite. And therefore, even if we define the “efficiently- set of functions computable” functions f : N → N by taking a countably-infinite logical closure, we are sure to miss some functions (in fact, almost all of them!). f The observation above suggests a general strategy to tame the logical omniscience problem. Namely, we could refuse to define an agent’s “knowledge” in terms of which individual questions she can quickly answer, and insist on speaking instead about which infinite of questions families she can quickly answer. In slogan form, we want to “fight omniscience with infinity.” Let’s see how, by taking this route, we can give semi-plausible answers to the puzzles about knowledge discussed earlier in this section. First, the reason why you can “know” that 1591 = 43 × 37, but at the same time not “know” the prime factors of 1591, is that, when we speak about knowing the answers to these questions, we really mean knowing how to answer them. And as we saw, there need not be any contradiction in knowing a fast multiplication algorithm but not a fast factoring algorithm, even if we model your knowledge about algorithms as deductively closed. To put it another way, by embedding the two questions 20

21 Q1 = “Is 1591 = 43 × 37?” Q2 = “What are the prime factors of 1591?” into infinite families of related questions , we can break the symmetry between the knowledge en- tailed in answering them. Similarly, we could think of a child as possessing an internal algorithm which, given any state- y y = y + x (for specific ment of the form and x values), immediately outputs true , without + x x and y . However, the child does not yet have the ability to process quantified even examining ∀ x,y ∈ R x + statements, such as “ = y + x .” In that sense, she still lacks the explicit knowledge y that addition is commutative. Although the “cure” for logical omniscience sketched above solves some puzzles, not surprisingly it raises many puzzles of its own. So let me end this section by discussing three major objections to the “infinity cure.” The first objection is that we’ve simply pushed the problem of logical omniscience somewhere else. For suppose an agent “knows” how to compute every function in some restricted class such as FP . Then how can we ever make sense of the agent learning a new algorithm? One natural f ∈ FP response is that, even if you have the “latent ability” to compute a function , you might not know that you have the ability—either because you don’t know a suitable algorithm, or because do know an algorithm, but don’t know that it’s an algorithm for f you . Of course, if we wanted to pursue things to the bottom, we’d next need to tell a story about knowledge of algorithms , and how logical omniscience is avoided there. However, I claim that this represents progress! For notice that, even without such a story, we can already explain some failures of logical omniscience. For example, the reason why you don’t know the factors of a large number might not be your ignorance of a fast factoring method, but rather that no such method exists. The second objection is that, when I advocated focusing on infinite families of questions rather infinite families. The difficulty is that the than single questions in isolation, I never specified which same question could be generalized in wildly different ways. As an example, consider the question Q = “Is 432150 composite?” Q is an instance of a computational problem that humans find very hard: “given a large integer N N composite?” However, Q is also an instance of a computational problem that humans , is N ending in find very easy: “given a large integer N composite?” And indeed, we’d expect a 0, is person to know the answer to Q she noticed that 432150 ends in 0, but not otherwise. To me, if if we want to discuss an agent’s knowledge in terms of what this example demonstrates is that, individual questions such as Q, then the relevant issue will be whether there a generalization exists G of Q, such that the agent knows a fast algorithm for answering questions of type G, and also recognizes that Q is of type G. The third objection is just the standard one about the relationship between asymptotic com- plexity and finite statements. For example, if we model an agent’s knowledge using the Cobham axioms, then we can indeed explain why the agent doesn’t know how to play perfect chess on an 33 n board, for arbitrary values of n × n But on a standard 8 × 8 board, playing perfect chess . 60 ∼ 10 computational steps, which is a constant, and therefore cer- would “merely” require (say) tainly polynomial! So strictly on the basis of the Cobham axioms, what explanation could we 33 For chess on an n × n board is known to be EXP -complete, and it is also known that P 6 = EXP . See Section 10, and particularly footnote 64, for more details. 21

22 possibly offer for why a rational agent, who knew the rules of 8 × 8 chess, didn’t also know how to play it optimally? While this objection might sound devastating, it’s important to understand that it’s no different from the usual objection leveled against complexity-theoretic arguments, and vulnerable to being can be given the usual response. Namely: asymptotic statements are always rendered irrelevant, if the constant factors turned out to be ridiculous. However, experience has shown that, for whatever reasons, that happens rarely enough that one can usually take asymptotic behavior as “having explanatory force until proven otherwise.” (Section 12 will say more about the explanatory force of asymptotic claims, as a problem requiring philosophical analysis.) 5.3 Summary Because of the difficulties pointed out in Section 5.2, my own view is that computational complexity theory has not yet come close to “solving” the logical omniscience problem, in the sense of giving 34 I have no a satisfying formal account of knowledge that also avoids making absurd predictions. 35 idea whether such an account is even possible. However, what I’ve tried to show in this section is that complexity theory provides a well-defined “limiting case” where the logical omniscience is The limiting case is where the problem solvable, about as well as one could hope it to be. size of the questions grows without bound, and the solution there is given by the Cobham axioms: can “axioms of knowing how” whose logical closure one take without thereby inviting omniscience. In other words, when we contemplate the omniscience problem, I claim that we’re in a situation similar to one often faced in physics—where we might be at a loss to understand some phenomenon (say, gravitational entropy), except in limiting cases such as black holes. In epistemology just like in physics, the limiting cases that we do more-or-less understand offer an obvious starting point for those wishing to tackle the general case. 6 Computationalism and Waterfalls waterfall ar- Over the past two decades, a certain argument about computation—which I’ll call the 36 —has been widely discussed by philosophers of mind. Like Searle’s famous Chinese Room gument argument [115], the waterfall argument seeks to show that computations are “inherently syntactic,” and can never be “about” anything—and that for this reason, the doctrine of “computationalism” 37 is false. But unlike the Chinese Room, the waterfall argument supplements the bare appeal to intuition by a further claim: namely, that the “meaning” of a computation, to whatever extent it has one, is always relative to some external observer . 34 Admittedly, I haven’t done justice in this section to the large literature on logical omniscience; readers wishing to delve deeper should see Fagin and Halpern [53] for example. 35 Compare the pessimism expressed by Paul Graham [69] about knowledge representation more generally: In practice formal logic is not much use, because despite some progress in the last 150 years we’re still only able to formalize a small percentage of statements. We may never do that much better, for the same reason 1980s-style “knowledge representation” could never have worked; many statements may have no representation more concise than a huge, analog brain state. 36 See Putnam [107, appendix] and Searle [116] for two instantiations of the argument (though the formal details of either will not concern us here). 37 “Computationalism” refers to the view that the mind is literally a computer, and that thought is literally a type of computation. 22

23 More concretely, consider a waterfall (though any other physical system with a large enough state space would do as well). Here I do not mean a waterfall that was specially engineered really a naturally-occurring waterfall: say, Niagara Falls. to perform computations, but Being from a set of possible initial f governed by laws of physics, the waterfall implements some mapping reversible , then states to a set of possible final states. If we accept that the laws of physics are f must also be injective. Now suppose we restrict attention to some finite subset S of possible S initial states, with = n . Then f is just a one-to-one mapping from S to some output set | | = f ( S ) with | T | T n . The “crucial observation” is now this: given any permutation σ from the = set of integers 1 ,...,n } to itself, there is some way to label the elements of S and T by integers in { S 1 } { f as implementing σ . For example, if we let ,...,n = { s } ,...,s , such that we can interpret n 1 and f ( s ). But ) = t i , then it suffices to label the initial state s ( by i and the final state t σ by i i i i could have any “semantics” we like: it might represent a program for playing σ the permutation Therefore “mere computation” chess, or factoring integers, or simulating a different waterfall. cannot give rise to semantic meaning. Here is how Searle [116, p. 57] expresses the conclusion: If we are consistent in adopting the Turing test or some other “objective” criterion for intelligent behavior, then the answer to such questions as “Can unintelligent bits of matter produce intelligent behavior?” and even, “How exactly do they do it” are ludi- crously obvious. Any thermostat, pocket calculator, or waterfall produces “intelligent Certain artifacts are designed behavior,” and we know in each case how it works. to behave as if they were intelligent, and since everything follows laws of nature, then everything will have some description under which it behaves as if it were intelligent. But this sense of “intelligent behavior” is of no psychological relevance at all. The waterfall argument has been criticized on numerous grounds: see Haugeland [72], Block [30], and especially Chalmers [37] (who parodied the argument by proving that a cake recipe, being To my mind, merely syntactic, can never give rise to the semantic attribute of crumbliness). though, perhaps the easiest way to demolish the waterfall argument is through computational complexity considerations. Indeed, suppose we actually wanted to use a waterfall to help us calculate chess moves. How would we do that? In complexity terms, what we want is a reduction from the chess problem to the waterfall-simulation problem. That is, we want an efficient algorithm that somehow encodes P into an initial state s a chess position ∈ S of the waterfall, in such a way that a good move P 38 P can be read out efficiently from the waterfall’s corresponding final state, f ( s But ) ∈ T . from P what would such an algorithm look like? We cannot say for sure—certainly not without detailed (i.e., the physics of waterfalls), as well as the means by which the S and knowledge about f T elements are encoded as binary strings. But for any reasonable choice, it seems overwhelmingly solve the chess problem itself , without using the likely that any reduction algorithm would just waterfall in an essential way at all! A bit more precisely, I conjecture that, given any chess-playing algorithm A that accesses a “waterfall oracle” W , there is an equally-good chess-playing algorithm ′ A , with similar time and space requirements, that does not access W . If this conjecture holds, then 38 nonadaptive reductions. An adaptive reduction Technically, this describes a restricted class of reductions, called from chess to waterfalls might solve a chess problem by some procedure that involves initializing a waterfall and observing its final state, then using the results of that aquatic computation to initialize a second waterfall and observe its final state, and so on for some polynomial number of repetitions. 23

24 it gives us a perfectly observer-independent way to formalize our intuition that the “semantics” of 39 waterfalls have nothing to do with chess. 6.1 “Reductions” That Do All The Work Interestingly, the issue of “trivial” or “degenerate” reductions also arises within complexity theory, so it might be instructive to see how it is handled there. Recall from Section 3.1 that a problem -complete NP problems” ( NP being the is if, loosely speaking, it is “maximally hard among all NP class of problems for which solutions can be checked in polynomial time). More formally, we say is NP -complete if L that ∈ NP , and (i) L ′ ′ L NP , there exists a polynomial-time algorithm to solve L problem using (ii) given any other L ′ L L P ∈ access to an oracle that solves L . P (Or more succinctly, denotes the , where complexity class augmented by an L -oracle.) P NP -completeness had incredible explanatory power: it showed that The concept of thousands of seemingly-unrelated problems from physics, biology, industrial optimization, mathematical logic, identical from the standpoint of polynomial-time computation, and that and other fields were all not one of these problems had an efficient solution unless = NP . Thus, it was natural for P P -completeness theoretical computer scientists to want to define an analogous concept of . In other words: among all the problems that solvable in polynomial time, which ones are “maximally are hard”? But how should -completeness even be defined? To see the difficulty, suppose that, by analogy P NP with L is P -complete if -completeness, we say that (i) L ∈ P and L ′ ′ (ii) L for every L ∈ ∈ P . P every problem is P -complete! For Then it is easy to see that the second condition is vacuous: P ′ L to in “reducing” , a polynomial-time algorithm can always just ignore the L -oracle and solve L ′ by itself, much like our hypothetical chess program that ignored its waterfall oracle. Because L of this, condition (ii) must be replaced by a stronger condition; one popular choice is L ′ ′ LOGSPACE (ii’) L L ∈ ∈ P . for every Here LOGSPACE means, informally, the class of problems solvable by a deterministic Turing 40 machine with a read/write memory consisting of only log bits, given an input of size n . It’s not n 39 The perceptive reader might suspect that we smuggled our conclusion into the assumption that the waterfall states s were encoded as binary strings in a “reasonable” way (and not, for example, in a ∈ S and f ( s T ) ∈ P P way that encodes the solution to the chess problem). But a crucial lesson of complexity theory is that, when we discuss “computational problems,” we always make an implicit commitment about the input and output encodings anyway! So for example, if positive integers were given as input via their prime factorizations, then the factoring problem would be trivial (just apply the identity function). But who cares? If, in mathematically defining the waterfall-simulation problem, we required input and output encodings that entailed solving chess problems, then it would no longer be reasonable to call our problem (solely) a “waterfall-simulation problem” at all. 40 Note that a LOGSPACE machine does not even have enough memory to store its input string! For this reason, we think of the input string as being provided on a special read-only tape. 24

25 hard to show that ⊆ , and this containment is strongly believed to be strict (though LOGSPACE P 6 = , there is no proof yet). The key point is that, if we want a non-vacuous just like with P NP weaker notion of completeness, then the reducing complexity class needs to be (either provably or conjecturally) than the class being reduced to. In fact complexity classes even smaller than LOGSPACE almost always suffice in practice. In my view, there is an important lesson here for debates about computationalism. Suppose we want to claim, for example, that a computation that plays chess is “equivalent” to some other Then our claim is only non-vacuous if it’s possible to computation that simulates a waterfall. itself exhibit the equivalence (i.e., give the reductions) within a model of computation that isn’t powerful enough to solve the chess or waterfall problems. 7 PAC-Learning and the Problem of Induction Centuries ago, David Hume [77] famously pointed out that learning from the past (and, by exten- sion, science) seems logically impossible. For example, if we sample 500 ravens and every one of them is black, why does that give us any grounds—even probabilistic grounds—for expecting the st raven to be black also? Any modern answer to this question would probably refer to 501 Occam’s razor , the principle that simpler hypotheses consistent with the data are more likely to be correct. So for example, the hypothesis that all ravens are black is “simpler” than the hypothesis that most ravens are green or purple, and that only the 500 we happened to see were black. Intuitively, it seems Occam’s razor must be part of the solution to Hume’s problem; the difficulty is that such a response leads to questions of its own: (1) What do we mean by “simpler”? Why are simple explanations likely to be correct? Or, less ambitiously: what properties must (2) reality have for Occam’s Razor to “work”? (3) How much data must we collect before we can find a “simple hypothesis” that will probably predict future data? How do we go about finding such a hypothesis? In my view, the theory of , initiated by Leslie PAC (Probably Approximately Correct) Learning Valiant [131] in 1984, has made large enough advances on all of these questions that it deserves to 41 be studied by anyone interested in induction. In this theory, we consider an idealized “learner,” x ,...,x , together with the drawn randomly from some large set S who is presented with points 1 m , “classifications” x ( ) ,...,f ( x f ) of those points. The learner’s goal is to infer the function f m 1 f ( x well enough to be able to predict most future points x ∈ S . As an example, the learner ) for might be a bank, S might be a set of people (represented by their credit histories), and f ( x ) might represent whether or not person will default on a loan. x For simplicity, we often assume that S is a set of binary strings, and that the function f maps each x ∈S to a single bit, f ( x ) ∈{ 0 , 1 } . Both assumptions can be removed without significantly changing the theory. The important assumptions are the following: 41 See Kearns and Vazirani [83] for an excellent introduction to PAC-learning, and de Wolf [140] for previous work applying PAC-learning to philosophy and linguistics: specifically, to fleshing out Chomsky’s “poverty of the stimulus” argument. De Wolf also discusses several formalizations of Occam’s Razor other than the one based on PAC-learning. 25

26 (1) Each of the sample points x ,...,x from some (possibly-unknown) is drawn independently m 1 over S . Furthermore, the future points x on which the learner will “sample distribution” D ( x need to predict f ) are drawn from the same distribution. H . belongs to a known “hypothesis class” H represents “the set of f (2) The function This possibilities the learner is willing to entertain” (and is typically much smaller than the set of |S| S to { 0 all 2 1 } ). , possible functions from Under these assumptions, we have the following central result. Consider a finite hypothesis class , a Boolean function f : S → Theorem 2 (Valiant [131]) H over , } 0 H , and a sample distribution D 1 S , as well as an error rate ε > 0 and failure probability { in 0 that the learner is willing to tolerate. Call a hypothesis h : S →{ 0 , δ > } “good” if 1 Pr ε. [ h ( x ) = f ( x )] ≥ 1 − ∼D x x Also, call sample points ,...,x ) “reliable” if any hypothesis h ∈ H that satisfies h ( x x ) = f ( i m 1 i i ∈{ 1 ,...,m } is good. Then for all 1 |H| = m ln ε δ x . ,...,x δ sample points D will be reliable with probability at least 1 − drawn independently from m 1 Intuitively, Theorem 2 says that the behavior of f on a small number of randomly-chosen points probably determines its behavior on of the remaining points. In other words, if, by some most h unspecified means, the learner manages to find any hypothesis ∈H that makes correct predictions , then provided m is large enough (and as it happens, m doesn’t x on all its past data points ,...,x 1 m will also make the correct need to be very large), the learner can be statistically confident that h predictions on most future points. The part of Theorem 2 that bears the unmistakable imprint of complexity theory is the bound |H| 1 m = on sample size, ln . This bound has three notable implications. First, even if the class H ε δ n ), one can still learn an arbitrary function f ∈ H contains exponentially many hypotheses (say, 2 linear grows only logarithmically with |H| : in other words, m using a amount of sample data, since an individual hypothesis. Second, one can make the like the number of bits needed to write down − n exponentially small (say, probability that the hypothesis = 2 h will fail to generalize ), at the δ cost of increasing the sample size m by only a linear factor. Third, assuming the hypothesis does generalize, its error rate ε decreases inversely with m . It is not hard to show that each of these dependencies is tight, so that for example, if we demand either ε = 0 or δ = 0 then no finite m suffices. This is the origin of the name “PAC-learning”: the most one can hope for is to output a hypothesis that is “probably, approximately” correct. h ∈H bad , meaning that The proof of Theorem 2 is easy: consider any hypothesis that is )] f h ( x ) = Pr ( x [ < 1 − ε. x ∼D Then by the independence assumption, m ) Pr . h ( x ε ) = f ( x − ) ∧···∧ h ( x (1 ) = f ( x < )] [ m m 1 1 ,...,x x ∼D m 1 26

27 Now, the number of bad hypotheses is no more than the total number of hypotheses, |H| . So by exists a bad hypothesis that agrees with on all of the union bound, the probability that there f m m can be at most |H|· (1 − ε ) ,...,x . Therefore δ ≤ |H|· (1 − x ) , and all that remains is to ε m 1 . solve for m The relevance of Theorem 2 to Hume’s problem of induction is that the theorem describes a nontrivial class of situations where induction is guaranteed to work with high probability. Theorem 2 also illuminates the role of Occam’s Razor in induction. In order to learn using a “reasonable” , the hypothesis class H must have a sufficiently small cardinality. But m number of sample points h that is equivalent to saying that every hypothesis must have a succinct description —since ∈ H the number of bits needed to specify an arbitrary hypothesis ∈ H is simply d log h |H|e . If the 2 number of bits needed to specify a hypothesis is too large, then will always be vulnerable to H overfitting : some hypotheses h ∈H surviving contact with the sample data just by the problem of chance. As pointed out to me by Agust ́ın Rayo, there are several possible interpretations of Occam’s Razor that have nothing to do with descriptive complexity: for example, we might want our hypotheses to be “simple” in terms of their ontological or ideological commitments. However, to shorter or lower-complexity hypotheses whatever extent we interpret Occam’s Razor as saying that are preferable, Theorem 2 comes closer than one might have thought possible to a mathematical justification for why the Razor works. Many philosophers might be familiar with alternative formal approaches to Occam’s Razor. For example, within a Bayesian framework, one can choose a prior over all possible hypotheses that gives greater weight to “simpler” hypotheses (where simplicity is measured, for example, by the length of the shortest program that computes the predictions). However, while the PAC-learning and Bayesian approaches are related, the PAC approach has the advantage of requiring only a qualitative decision about which hypotheses one wants to consider, rather than a quantitative prior over hypotheses. Given the hypothesis class H , one can then seek learning methods that work for f ∈H any . (On the other hand, the PAC approach requires an assumption about the probability , while the Bayesian approach does not.) observations distribution over 7.1 Drawbacks of the Basic PAC Model I’d now like to discuss three drawbacks of Theorem 2, since I think the drawbacks illuminate philosophical aspects of induction as well as the advantages do. The first drawback is that Theorem 2 works only for finite hypothesis classes. In science, how- ever, hypotheses often involve continuous parameters, of which there is an uncountable infinity. Of course, one could solve this problem by simply discretizing the parameters, but then the number of hypotheses (and therefore the relevance of Theorem 2) would depend on how fine the discretization the learner only cares about the was. Fortunately, we can avoid such difficulties by realizing that This leads to “differences” between two hypotheses insofar as they lead to different predictions. VC-dimension the fundamental notion of (after its originators, Vapnik and Chervonenkis [133]). A hypothesis class H shatters the sample points { Definition 3 (VC-dimension) }⊆S ,...,x x 1 k k 2 possible settings of if for all h ( x compatible with ) ,...,h ( x ∈ H ) , there exists a hypothesis h 1 k VCdim ( H ) those settings. Then H , is the largest k for which there exists a , the VC-dimension of subset { x ). ,...,x ∞ }⊆S that H shatters (or if no finite maximum exists, then VCdim ( H ) = 1 k 27

28 Clearly any finite hypothesis class has finite VC-dimension: indeed, VCdim ( H ≤ log ) |H| . 2 However, even an infinite hypothesis class can have finite VC-dimension if it is “sufficiently simple.” be the class of all functions h For example, let : R →{ 0 , 1 } of the form H a,b { a 1 if ≤ x ≤ b h x ( ) = a,b otherwise. 0 H ) = 2. Then it is easy to check that VCdim ( With the notion of VC-dimension in hand, we can state a powerful (and harder-to-prove!) generalization of Theorem 2, due to Blumer et al. [31]. For some universal constant K > 0 , the bound on m in The- Theorem 4 (Blumer et al. [31]) orem 2 can be replaced by H K VCdim ( ) 1 m = ln , ε δε H , finite or infinite. with the theorem now holding for any hypothesis class H has infinite VC-dimension, then it is easy to construct a probability distribution D over If sample points such that no finite number m of samples from D suffices to PAC-learn a function f ∈ H : one really is in the unfortunate situation described by Hume, of having no grounds at all for predicting that the next raven will be black. In some sense, then, Theorem 4 is telling us that finite VC-dimension is a necessary and sufficient condition for scientific induction to be possible. Once again, Theorem 4 also has an interpretation in terms of Occam’s Razor, with the smallness of the VC-dimension now playing the role of simplicity. The second drawback of Theorem 2 is that it gives us no clues about how to find a hypothesis ∈ H consistent with the sample data. All it says is that, if we find such an h , then h h will probably be close to the truth. This illustrates that, even in the simple setup envisioned by cannot PAC-learning, induction be merely a matter of seeing enough data and then “generalizing” find a suitable generalization! Indeed, from it, because immense computations might be needed to following the work of Kearns and Valiant [82], we now know that many natural learning problems— as an example, inferring the rules of a regular or context-free language from random examples of grammatical and ungrammatical sentences—are computationally intractable in an extremely strong sense: Any polynomial-time algorithm for finding a hypothesis consistent with the data would 42 imply a polynomial-time algorithm for breaking widely-used cryptosystems such as RSA! in the above statement is far from accidental. In a sense cryptography The appearance of that can be made precise, learning and cryptography are “dual” problems: a learner wants to hard to find patterns in data, while a cryptographer wants to generate data whose patterns are More concretely, one of the basic primitives in cryptography is called a pseudorandom find. n . This is a family of efficiently-computable Boolean functions f → : { 0 , 1 } function family s 42 In the setting of “proper learning”—where the learner needs to output a hypothesis in some specified format—it is even known that many natural PAC-learning problems are NP -complete (see Pitt and Valiant [105] for example). But in the “improper” setting—where the learner can describe its hypothesis using any polynomial-time algorithm—it is only known how to show that PAC-learning problems are hard under cryptographic assumptions, and there seem to be inherent reasons for this (see Applebaum, Barak, and Xiao [14]). 28

29 { 0 1 } , parameterized by a short random “seed” s , that are virtually indistinguishable from random , by a polynomial-time algorithm. functions Here, we imagine that the would-be distinguishing x , and also that it knows the mapping from algorithm can query the function on various points f s f , and so is ignorant only of the seed s s itself. There is strong evidence in cryptography that to s pseudorandom function families exist: indeed, Goldreich, Goldwasser, and Micali [65] showed how to construct one starting from any pseudorandom generator (the latter was mentioned in Section 43 1.1). { f } Now, given a pseudorandom function family , imagine a PAC-learner whose hypothesis class s H f consists of for all possible seeds s . The learner is provided some randomly-chosen sample points s n on those points: ). Given ∈ { 0 , 1 } x ,...,x f x ( f ,...,f ( x ) , together with the values of 1 s s 1 s m m this “training data,” the learner’s goal is to figure out how to compute f for itself—and thereby s predict the values of f ( x ) on new points x , points not in the training sample. Unfortunately, s it’s easy to see that the learner could do that, then it would thereby distinguish f from a truly if s { f random function—and thereby contradict our starting assumption that } was pseudorandom! s Our conclusion is that, the basic assumptions of modern cryptography hold (and in particular, if if there exist pseudorandom generators), then there must be situations where learning is impossible purely because of computational complexity (and not because of insufficient data). The third drawback of Theorem 2 is the assumption that the distribution from which the D learner is tested is the same as the distribution from which the sample points were drawn. To me, this is the most serious drawback, since it tells us that PAC-learning models the “learning” performed by an undergraduate cramming for an exam by solving last year’s problems, or an employer using a regression model to identify the characteristics of successful hires, or a cryptanalyst breaking a code from a collection of plaintexts and ciphertexts. It does not, however, model the “learning” of an Einstein or a Szilard, making predictions about phenomena that are different in kind from anything yet observed. As David Deutsch stresses in his recent book The Beginning of [49], the goal of science is not merely to summarize observations, and thereby let us make Infinity predictions about similar observations. Rather, the goal is to discover explanations with “reach,” meaning the ability to predict what would happen even in novel or hypothetical situations, like the Sun suddenly disappearing or a quantum computer being built. In my view, developing a explanatory compelling mathematical model of learning—a model that “is to explanation as the 44 PAC model is to prediction”—is an outstanding open problem. 7.2 Computational Complexity, Bleen, and Grue In 1955, Nelson Goodman [68] proposed what he called the “new riddle of induction,” which survives the Occam’s Razor answer to Hume’s original induction problem. In Goodman’s riddle, we are asked to consider the hypothesis “All emeralds are green.” The question is, why do we favor that hypothesis over the following alternative, which is equally compatible with all our evidence of green emeralds? 43 Furthermore, H ̊astad et al. [125] showed how to construct a pseudorandom generator from any one-way function : roughly speaking, a function f that is easy to compute but hard to invert even on a random input. 44 This problem is not as hopeless as it might sound! Important progress includes the work of Angluin [11] on learning finite automata from queries and counterexamples, and that of Angluin et al. [12] on learning a circuit by injecting values. Both papers study natural learning models that generalize the PAC model by allowing “controlled scientific experiments,” whose results confirm or refute a hypothesis and thereby provide guidance about which experiments to do next. 29

30 “All emeralds are green before January 1, 2030, and then blue afterwards.” The obvious answer is that the second hypothesis adds superfluous complications, and is there- fore disfavored by Occam’s Razor. To that, Goodman replies that the definitions of “simple” and “complicated” depend on our language. In particular, suppose we had no words for green or blue, grue but we did have a word , meaning “green before January 1, 2030, and blue afterwards,” and a , meaning “blue before January 1, 2030, and green afterwards.” In that case, we could word bleen only express the hypothesis “All emeralds are green” by saying “All emeralds are grue before January 1, 2030, and then bleen afterwards.” —a manifestly more complicated hypothesis than the simple “All emeralds are grue”! I confess that, when I contemplate the grue riddle, I can’t help but recall the joke about the won’t Anti-Inductivists, who, when asked why they continue to believe that the future resemble the past, when that false belief has brought their civilization nothing but poverty and misery, reply, “because anti-induction has never worked before!” Yes, if we artificially define our primitive concepts “against the grain of the world,” then we shouldn’t be surprised if the world’s actual behavior becomes more cumbersome to describe, or if we make wrong predictions. It would be as if we were using a programming language that had no built-in function for multiplication, but only 2 x,y ) := 17 x − y ( x F + 2 xy . In that case, a normal person’s first instinct would be either for − define multiplication in terms of F , and forget about to switch programming languages, or else to 45 from that point onward! is a genuine philosophical problem here: why do grue, F Now, there ( x,y ) go “against the grain of the world,” whereas green, blue, and multiplication bleen, and F go with the grain? But to me, that problem (like Wigner’s puzzlement over “the unreasonable effectiveness of mathematics in natural sciences” [139]) is more about the world itself than about human concepts, so we shouldn’t expect any purely linguistic analysis to resolve it. What about computational complexity, then? In my view, while computational complexity doesn’t solve the grue riddle, it does contribute a useful insight. Namely, that when we talk about the simplicity or complexity of hypotheses, we should distinguish two issues: asymptotic scaling of the hypothesis size, as the “size” n of our learning problem goes to (a) The infinity. (b) The constant-factor overheads. n , which In terms of the basic PAC model in Section 7, we can imagine a “hidden parameter” S = S measures the number of bits needed to specify an individual point in the set . (Other n ways to measure the “size” of a learning problem would also work, but this way is particularly n For convenience, we can identify S -bit strings, so that with the set { 0 , 1 } convenient.) of n n n |S = log | . We then need to consider, not just a single family hypothesis class, but an infinite n 2 45 Suppose that our programming language provides only multiplication by constants, addition, and the function 2 2 ) := ax bxy + F + cy ( + dx + ey + f . We can assume without loss of generality that d = e = f = 0. Then x,y 2 2 provided + bxy + cy ax factors into two independent linear terms, px + qy and rx + sy , we can express the product xy as F ( sx − qy, − rx + py ) . 2 ( ps − qr ) 30

31 of hypothesis classes H {H = , H consists of , H H ,... } , one for each positive integer n . Here 3 n 1 2 n 1 = { 0 , 1 } that map to { 0 , S } . h hypothesis functions n L be a language for specifying hypotheses in H : in other words, a mapping from (some Now let ∗ 0 , 1 } to subset of) binary strings H y h ∈H , let ∈{ . Also, given a hypothesis ( ) := min {| y | : h ( y ) = h } κ L L | description of in the language L . (Here | y h just means the number be the length of the shortest y .) Finally, let of bits in } ( n ) := max { κ ∈H ( h ) : κ h n L L arbitrary be the number of bits needed to specify an hypothesis in using the language L . H n , with equality if and only if ( n ) ≥ d log Clearly |H κ |e is “optimal” (that is, if it represents L n L 2 each hypothesis h ∈ H using as few bits as possible). The question that concerns us is how n κ . ( n ) grows as a function of n , for various choices of language L quickly L What does any of this have to do with the grue riddle? Well, we can think of the details of L κ n ). So for (its syntax, vocabulary, etc.) as affecting the “lower-order” behavior of the function ( L contains the words L and bleen , but not blue example, suppose we are unlucky enough that grue green . That might increase κ ( and n ) by a factor of ten or so—since now, every time we want L to mention “green” when specifying our hypothesis , we instead need a wordy circumlocution h 46 like “grue before January 1, 2030, and then bleen afterwards,” and similarly for blue. However, κ n ( a crucial lesson of complexity theory is that the “higher-order” behavior of )—for example, L whether it grows polynomially or exponentially with n —is almost completely unaffected by the details of L ! The reason is that, if two languages L differ only in their “low-level details,” and L 2 1 a hypothesis from translating to L L or vice versa will increase the description length by no then 1 2 more than a polynomial factor. Indeed, as in our grue example, there is usually a “universal trans- lation constant” such that κ c ) ≤ cκ ( h κ h ( ) or even ( h ) ≤ κ hypothesis every for ( c ) + h L L L L 1 2 1 2 h ∈H . L The one exception to the above rule is if the languages and L expressive have different 2 1 L powers only allows nesting expressions to depth two, while For example, maybe . allows L 2 1 also allows first- only allows propositional connectives, while L nesting to arbitrary depths; or L 1 2 order quantifiers. κ In those cases, ( h ) could indeed be much greater than κ ( h ) for some L L 1 2 h ( κ ) L 2 h κ , possibly even exponentially greater ( hypotheses 2 ≈ ( h ) ). A rough analogy would be L 1 this: suppose you hadn’t learned what differential equations were, and had no idea how to solve In that case, Newtonian mechanics might seem just them even approximately or numerically. more complicated! For the as complicated to you as the Ptolemaic theory with epicycles, if not only way you could make predictions with Newtonian mechanics would be using a huge table of “precomputed” differential equation solutions—and to you , that table would seem just as unwieldy and inelegant as a table of epicycles. But notice that in this case, your perception would be the 46 L is expressive enough to allow this, we can simply define green and blue in Though note that, if the language terms of bleen and grue once , then refer back to those definitions whenever needed! In that case, taking bleen and κ grue (rather than green and blue) to be the primitive concepts would increase ( n ) by only an additive constant, L rather than a multiplicative constant. The above fact is related to a fundamental result from the theory of Kolmogorov complexity (see Li and Vit ́anyi P and Q are any two Turing-universal programming languages, and if K [90] for example). Namely, if ( x ) and P ∗ , then ( x ) are the lengths of the shortest programs in P and Q respectively that output a given string x ∈{ 0 , 1 } K Q ) c is just , such that | K c ( x ) − K . This ( x there exists a universal “translation constant” |≤ c x for every P Q P P Q P Q Q the number of bits needed to write a P -interpreter for Q -programs or vice versa. 31

32 result, not of some arbitrary choice of vocabulary, but of an objective gap in your mathematical expressive powers. To summarize, our choice of vocabulary—for example, whether we take green/blue or bleen/grue as primitive concepts—could indeed matter if we want to use Occam’s Razor to predict the future n color of emeralds. But I think that complexity theory justifies us in treating grue as a “small- effect”: something that becomes less and less important in the asymptotic limit of more and more complicated learning problems. 8 Quantum Computing Quantum computing is a proposal for using quantum mechanics to solve certain computational 47 To do so, one would need to build problems much faster than we know how to solve them today. a new type of computer, capable of exploiting the quantum effects of superposition and interference. Building such a computer—one large enough to solve interesting problems—remains an enormous challenge for physics and engineering, due to the fragility of quantum states and the need to isolate them from their external environment. In the meantime, though, theoretical computer scientists have extensively studied what we could and couldn’t do with a quantum computer if we had one. For certain problems, remarkable quantum algorithms are known to solve them in polynomial time, even though the best-known classical algorithms require exponential time. Most famously, in 1994 Peter Shor [119] gave a polynomial-time quantum algorithm for factoring integers, and as a byproduct, breaking most of Besides the practical implications, Shor’s the cryptographic codes used on the Internet today. algorithm also provided a key piece of evidence that switching from classical to quantum comput- ers would enlarge the class of problems solvable in polynomial-time. For theoretical computer scientists, this had a profound lesson: if we want to know the limits of efficient computation, we may need to “leave our armchairs” and incorporate actual facts about physics (at a minimum, the 48 truth or falsehood of quantum mechanics!). Whether or not scalable quantum computers are built anytime soon, my own (biased) view is that quantum computing represents one of the great scientific advances of our time. But here I want philosophy to ask a different question: does quantum computing have any implications for —and specifically, for the interpretation of quantum mechanics? From one perspective, the answer seems like an obvious “no.” Whatever else it is, quantum computing is “merely” an application of quantum mechanics, as that theory has existed in physics if textbooks for 80 years. Indeed, you accept that quantum mechanics (as currently understood) is true, then presumably you should also accept the possibility of quantum computers, and make the same predictions about their operation as everyone else. Whether you describe the “reality” behind quantum processes via the Many-Worlds Interpretation, Bohmian mechanics, or some other view (or, following Bohr’s Copenhagen Interpretation, refuse to discuss the “reality” at all), seems irrelevant. 47 The authoritative reference for quantum computing is the book of Nielsen and Chuang [100]. For gentler introductions, try Mermin [93, 94] or the survey articles of Aharonov [10], Fortnow [58], or Watrous [136]. For a general discussion of polynomial-time computation and the laws of physics (including speculative models beyond quantum computation), see my survey article “ NP -complete Problems and Physical Reality” [4]. 48 By contrast, if we only want to know what is computable in the physical universe, with no efficiency requirement, then it remains entirely consistent with current knowledge that Church and Turing gave the correct answer in the 1930s—and that they did so without incorporating any physics beyond what is “accessible to intuition.” 32

33 From a different perspective, though, a scalable quantum computer would test quantum me- chanics in an extremely novel regime—and for that reason, it could indeed raise new philosophical issues. The “regime” quantum computers would test is characterized not by an energy scale or a temperature, but by computational complexity. One of the most striking facts about quantum entangled particles, one needs a vector of size n expo- mechanics is that, to represent the state of 1000 nential 2 particles, one needs 2 in n . For example, to specify the state of a thousand spin-1 / complex numbers called “amplitudes,” one for every possible outcome of measuring the spins in the , down } basis. The quantum state, denoted | ψ 〉 , is then a linear combination or “superposition” { up x weighted by its amplitude α : of the possible outcomes, with each outcome | 〉 x ∑ α . 〉 x | 〉 | ψ = x 1000 , x } ∈{ up down Given ψ 〉 , one can calculate the probability p | that any particular outcome | x 〉 will be observed, x 2 49 = via the rule α . | p | x x 80 atoms in the visible universe, which is a much smaller number Now, there are only about 10 1000 than 2 . So assuming quantum mechanics is true, it seems Nature has to invest staggering amounts of “computational effort” to keep track of small collections of particles—certainly more 51 50 , than anything classical physics requires! In the early 1980s, Richard Feynman [56] and others called attention to this point, noting that it underlay something that had long been apparent in practice: the extraordinary difficulty of simulating quantum mechanics using conventional comput- ers. But Feynman also raised the possibility of turning that difficulty around, by building our Such computers could conceivably solve certain prob- computers out of quantum components. lems faster than conventional computers: if nothing else, then at least the problem of simulating quantum mechanics! Thus, quantum computing is interesting not just because of its applications, but (even more, in it is the first technology that would directly “probe” the exponentiality inherent my opinion) because ∑ 2 49 | α | = 1. This means, in particular, that the amplitudes satisfy the normalization condition x x 50 One might object that even in the classical world, if we simply don’t the value of (say) an n -bit string, know then we describe our ignorance using exponentially-many numbers: namely, the probability p of each possible also x n x ∈ { , 1 } string ! And indeed, there is an extremely close connection between quantum mechanics and classical 0 probability theory; I often describe quantum mechanics as just “probability theory with complex numbers instead of nonnegative reals.” However, a crucial difference is that we can always describe a classical string as “really” having x n probabilities p a definite value; the vector of 2 is then just a mental representation of our own ignorance. With x a quantum state, we do not have the same luxury, because of the phenomenon of interference between positive and negative amplitudes. 51 One might also object that, even in classical physics, it takes infinitely many bits to record the state of even a single particle, if its position and momentum can be arbitrary real numbers. And indeed, Copeland [43], Hogarth [74], Siegelmann [120], and other writers have speculated that the continuity of physical quantities might actually From a modern allow “hypercomputations”—including solving the halting problem in a finite amount of time! perspective, though, quantum mechanics and quantum gravity strongly suggest that the “continuity” of measurable In other words, it ought to suffice for simulation quantities such as positions and momenta is a theoretical artifact. − 33 purposes to approximate these quantities to some finite precision, probably related to the Planck scale of 10 43 − centimeters or 10 seconds. But the exponentiality of quantum states is different, for at least two reasons. Firstly, it doesn’t lead to computa- tional speedups that are nearly as “unreasonable” as the hypercomputing speedups. Secondly, no one has any idea where the theory in question (quantum mechanics) could break down, in a manner consistent with current experi- ments. In other words, there is no known “killer obstacle” for quantum computing, analogous to the Planck scale for hypercomputing. See Aaronson [2] for further discussion of this point, as well as a proposed complexity-theoretic framework (called “Sure/Shor separators”) with which to study such obstacles. 33

34 in the quantum description of Nature. One can make an analogy here to the experiments in Like quantum algorithms today, the 1980s that first convincingly violated the Bell Inequality. Bell’s refutation of local realism was “merely” a mathematical consequence of quantum mechanics. of But that refutation (and the experiments that it inspired) made conceptually-important aspects quantum mechanics no longer possible to ignore—and for that reason, it changed the philosophical landscape. It seems overwhelmingly likely to me that quantum computing will do the same. Indeed, we can extend the analogy further: just as there were “local realist diehards” who denied that Bell Inequality violation would be possible (and tried to explain it away after it was achieved), so today a vocal minority of computer scientists and physicists (including Leonid Levin [89], Oded Goldreich [62], and Gerard ’t Hooft [76]) denies the possibility of scalable quantum computers, even in principle. While they admit that quantum mechanics has passed every experimental test for a century, these skeptics are confident that quantum mechanics will fail in the regime tested by quantum computing—and that whatever new theory replaces it, that theory will allow only classical computing. As most quantum computing researchers are quick to point out in response, they would be if the attempt to build scalable quantum computers led instead to a revision of quantum thrilled mechanics! Such an outcome would probably constitute the largest revolution in physics since the 1920s, and ultimately be much more interesting than building a quantum computer. Of course, it is also possible that scalable quantum computing will be given up as too difficult for “mundane” technological reasons, rather than fundamental physics reasons. But that “mundane” possibility is not what skeptics such as Levin, Goldreich, and ’t Hooft are talking about. 8.1 Quantum Computing and the Many-Worlds Interpretation But let’s return to the original question: suppose the skeptics are wrong, and it is possible to build scalable quantum computers. Would that have any relevance to the interpretation of quantum mechanics? The best-known argument that the answer is “yes” was made by David Deutsch, a quantum computing pioneer and staunch defender of the Many-Worlds Interpretation. To be precise, Deutsch thinks that quantum mechanics implies the existence of parallel straightforwardly universes, and that it does so independently of quantum computing: on his view, even the double- slit experiment can only be explained in terms of two parallel universes interfering. However, Deutsch also thinks that quantum computing adds emotional punch to the argument. Here is how The Fabric of Reality [48, p. 217]: he put it in his 1997 book Logically, the possibility of complex quantum computations adds nothing to a case [for the Many-Worlds Interpretation] that is already unanswerable. But it does add psychological impact. With Shor’s algorithm, the argument has been writ very large. To those who still cling to a single-universe world-view, I issue this challenge: explain how Shor’s algorithm works. I do not merely mean predict that it will work, which is merely a matter of solving a few uncontroversial equations. I mean provide an 500 explanation. When Shor’s algorithm has factorized a number, using 10 or so times the computational resources that can be seen to be present, where was the number 80 factorized? There are only about 10 atoms in the entire visible universe, an utterly 500 minuscule number compared with 10 . So if the visible universe were the extent of physical reality, physical reality would not even remotely contain the resources required 34

35 to factorize such a large number. Who did factorize it, then? How, and where, was the computation performed? There is plenty in the above paragraph for an enterprising philosopher to mine. In particular, how should a nonbeliever in Many-Worlds answer Deutsch’s challenge? In the rest of this section, I’ll focus on two possible responses. The first response is to deny that, if Shor’s algorithm works as predicted, that can only be explained by postulating “vast computational resources.” At the most obvious level, complexity 52 More gen- factoring algorithm. classical theorists have not yet ruled out the possibility of a fast erally, that quantum computers can solve certain problems superpolynomially faster than classical 54 , 53 conjecture . If the conjecture failed, computers is not a theorem, but a (profound, plausible) then the door would seem open to what we might call “polynomial-time hidden-variable theories”: theories that reproduce the predictions of quantum mechanics without invoking any computations 55 outside These would be analogous to the local hidden variable theories that Einstein and P . others had hoped for, before Bell ruled such theories out. A second response to Deutsch’s challenge is that, even if we agree that Shor’s algorithm demon- strates the reality of vast computational resources in Nature, it is not obvious that we should think one of those resources as “parallel universes.” Why not simply say that there is universe, and that it is quantum-mechanical? Doesn’t the parallel-universes language reflect an ironic : parochialism stranger a desire to impose a familiar science-fiction image on a mathematical theory that is than of our pre-quantum intuitions (including computational intuitions) fiction, that doesn’t match any particularly well? One can sharpen the point as follows: one took the parallel-universes explanation of how a if quantum computer works too seriously (as many popular writers do!), then it would be natural to make further inferences about quantum computing that are flat-out wrong. For example: 1000 2 “Using only a thousand quantum bits (or qubits), a quantum computer could store classical bits.” 52 ! But even if cannot P 6 Indeed, one NP rule that possibility out, without first proving P 6 = NP , a fast classical = factoring algorithm might still exist, again because factoring is not thought to be NP -complete. 53 A formal version of this conjecture is 6 = BQP , where BPP (Bounded-Error Probabilistic Polynomial-Time) BPP BQP and (Bounded-Error Quantum Polynomial-Time) are the classes of problems efficiently solvable by classical P ⊆ BPP ⊆ randomized algorithms and quantum algorithms respectively. Bernstein and Vazirani [29] showed that ⊆ PSPACE , where BQP is the class of problems solvable by a deterministic Turing machine using a polynomial PSPACE memory amount of BPP 6 = BQP conjecture would (but possibly exponential time). For this reason, any proof of the immediately imply P 6 = PSPACE as well. The latter would be considered almost as great a breakthrough as P 6 = NP . 54 Complicating matters, there quantum algorithms that provably achieve exponential speedups over any clas- are sical algorithm: one example is Simon’s algorithm [121], an important predecessor of Shor’s algorithm. However, all such algorithms are formulated in the “black-box model” (see Beals et al. [23]), where the resource to be minimized is the number of queries that an algorithm makes to a hypothetical black box. Because it is relatively easy to analyze, might be true in the conventional Turing machine the black-box model is a crucial source of insights about what model. However, it is also known that the black-box model sometimes misleads us about the “real” situation. As IP and PSPACE are equal [117], despite the existence of a black box that a famous example, the complexity classes separates them (see Fortnow [57] for discussion). Besides the black-box model, exponential separations between quantum and classical complexities unconditional are known in several other restricted models, including communication complexity [109]. 55 Technically, if the hidden-variable theory involved classical randomness, then it would correspond more closely to the complexity class BPP (Bounded-Error Probabilistic Polynomial-Time). However, today there is strong evidence that P = BPP (see Impagliazzo and Wigderson [80]). 35

36 This is true only for a bizarre definition of the word “store”! The fundamental problem is that, when you measure a quantum computer’s state, you see only of the possible outcomes; the one Holevo’s Theorem [75] says that, using qubits, rest disappear. Indeed, a celebrated result called n classical bits so that the bits can be reliably retrieved later. n there is no way to store more than In other words: for at least one natural definition of “information-carrying capacity,” qubits have exactly the same capacity as bits. To take another example: “Unlike a classical computer, which can only factor numbers by trying the divisors one by one, a quantum computer could try all possible divisors in parallel.” If quantum computers can harness vast numbers of parallel worlds, then the above seems like a reasonable guess as to how Shor’s algorithm works. But it’s not how it works at all . Notice that, did work that way, then it could be used not only for factoring integers, but if Shor’s algorithm also for the much larger task of solving NP -complete problems in polynomial time. (As mentioned not NP -complete.) But contrary to to be in footnote 12, the factoring problem is strongly believed a common misconception, quantum computers are neither known nor believed to be able to solve 56 -complete problems efficiently. NP As usual, the fundamental problem is that measuring reveals just a single random outcome | x 〉 . To get around that problem, and ensure that the right outcome is observed with high probability, a quantum algorithm needs to generate an interference pattern , in which the computational paths leading to a given wrong outcome cancel each other out, while the paths leading to a given right outcome reinforce each other. This is a delicate requirement, and as far as anyone knows, it can only be achieved for a few problems, most of which (like the 57 factoring problem) have special structure arising from algebra or number theory. A Many-Worlder might retort: “sure, I agree that quantum computing involves harnessing the parallel universes in subtle and non-obvious ways, but it’s still harnessing parallel universes! ” But even here, there’s a fascinating irony. Suppose we choose to think of a quantum algorithm in terms of parallel universes. Then to put it crudely, not only must many universes interfere to give a large lose their identities as parallel final amplitude to the right answer; they must also, by interfering, In other words, to whatever extent a collection of universes is useful for quantum universes! computation, to that extent it is arguable whether we ought to call them “parallel universes” at all (as opposed to parts of one exponentially-large, self-interfering, quantum-mechanical blob). Conversely, to whatever extent the universes have unambiguously separate identities, to that extent they’re now “decohered” and out of causal contact with each other. Thus we can explain the outputs of any future computations by invoking only one of the universes, and treating the others as unrealized hypotheticals. To clarify, I don’t regard either of the above objections to Deutsch’s argument as decisive, and am unsure what I think about the matter. My purpose, in setting out the objections, was simply to illustrate the potential of quantum computing theory to inform debates about the Many-Worlds Interpretation. 56 N There is a remarkable quantum algorithm called Grover’s algorithm [70], which can search any space of 2 possible 2 N/ 2 solutions in only steps. However, Grover’s algorithm represents a quadratic (square-root) improvement over ∼ classical brute-force search, rather than an exponential improvement. And without any further assumptions about the structure of the search space, Grover’s algorithm is optimal, as shown by Bennett et al. [27]. 57 Those interested in further details of how Shor’s algorithm works, but still not ready for a mathematical exposition, might want to try my popular essay “Shor, I’ll Do It” [1]. 36

37 9 New Computational Notions of Proof Since the time of Euclid, there have been two main notions of mathematical proof: (1) A “proof” is a verbal explanation that induces a sense of certainty (and ideally, understanding) about the statement to be proved, in any human mathematician willing and able to follow it. (2) A “proof” is a finite sequence of symbols encoding syntactic deductions in some formal system, which start with axioms and end with the statement to be proved. The tension between these two notions is a recurring theme in the philosophy of mathematics. But theoretical computer science deals regularly with a third notion of proof—one that seems to have received much less philosophical analysis than either of the two above. This notion is the following: (3) A “proof” is any computational process or protocol (real or imagined) that can terminate in a certain way if and only if the statement to be proved is true. 9.1 Zero-Knowledge Proofs zero-knowledge proofs , introduced by Goldwasser, As an example of this third notion, consider and H , each with n ≈ 10000 vertices, suppose that Micali, and Rackoff [67]. Given two graphs G G an all-powerful but untrustworthy wizard Merlin wishes to convince a skeptical king Arthur that H are and isomorphic. Of course, one way Merlin could do this would be to list all n ! graphs not obtained by permuting the vertices of , then note that none of these equal H . However, such a G proof would clearly exhaust Arthur’s patience (indeed, it could not even be written down within the observable universe). Alternatively, Merlin could point Arthur to some of G and H property that differentiates them: for example, maybe their adjacency matrices have different eigenvalue spectra. Unfortunately, it is not yet proven that, if and H are non-isomorphic, there is always G a differentiating property that Arthur can verify in time polynomial in n . But as noticed by Goldreich, Micali, and Wigderson [66], there is something Merlin can do instead: he can let Arthur challenge him. Merlin can say: Arthur, send me a new graph K either by randomly permuting , which you obtained G or randomly permuting the vertices of H . Then I guarantee that I the vertices of , ∼ ∼ will tell you, without fail, whether G K K or . H = = It is clear that, if G and H are really non-isomorphic, then Merlin can always answer such challenges correctly, by the assumption that he (Merlin) has unlimited computational power. But it is equally clear that, if G H are isomorphic, then Merlin must answer some challenges and G incorrectly, regardless of his computational power—since a random permutation of is statistically indistinguishable from a random permutation of H . This protocol has at least four features that merit reflection by anyone interested in the nature of mathematical proof. First, the protocol is probabilistic . Merlin cannot convince Arthur with certainty that G and H are non-isomorphic, since even if they were isomorphic, there’s a 1 / 2 probability that Merlin k would get lucky and answer a given challenge correctly (and hence, a 1 / 2 probability that he 37

38 would answer k challenges correctly). All Merlin can do is offer to repeat the protocol (say) 100 or 1000 times, and thereby make it less likely that his proof is unsound than that an asteroid will strike Camelot, killing both him and Arthur. Furthermore, even this statistical guarantee is only as secure as Arthur’s certainty that his choices during the protocol were “sufficiently random”! In other words, however Arthur generated his “random” challenges for Merlin—by flipping a coin, rolling a die, using a quantum-mechanical random-number source, etc.—we have to assume the method was free from “devious correlations” that would let Merlin cheat. interactive . Unlike with proof notions (1) and (2), Arthur is no longer Second, the protocol is a passive recipient of knowledge, but an active player who challenges the prover. We know from experience that the ability to interrogate a seminar speaker—to ask questions that the speaker could not have anticipated, evaluate the responses, and then possibly ask followup questions— often speeds up the process of figuring out whether the speaker knows what he or she is talking about. Complexity theory affirms our intuition here, through its discovery of interactive proofs for statements (such as “ G and H are not isomorphic”) whose shortest known conventional proofs are exponentially longer. The third interesting feature of the graph non-isomorphism protocol—a feature seldom mentioned— physical assumption. Namely, if Merlin had the power is that its soundness implicitly relies on a directly (whether through magic or through ordinary espionage) to “peer into Arthur’s study” and whether Arthur started with or H , then clearly he could answer every challenge correctly G observe ∼ even if G H . It follows that the persuasiveness of Merlin’s “proof” can only be as strong as = Arthur’s extramathematical belief that Merlin does have such powers. By now, there are many not other examples in complexity theory of “proofs” whose validity rests on assumed limitations of the provers. also hold As Shieber [118] points out, all three of the above properties of interactive protocols for the Turing Test discussed in Section 4! The Turing Test is interactive by definition, it is probabilistic because even a program that printed random gibberish would have some nonzero probability of passing the test by chance, and it depends on the physical assumption that the AI program doesn’t “cheat” by (for example) secretly consulting a human. For these reasons, itself Shieber argues that we can see the Turing Test as an early interactive protocol—one that convinces the verifier not of a mathematical theorem, but of the prover’s capacity for intelligent 58 verbal behavior. However, perhaps the most striking feature of the graph non-isomorphism protocol is that it zero-knowledge : a technical term formalizing our intuition that “Arthur learns nothing from the is 59 protocol, beyond the truth of the statement being proved.” For all Merlin ever tells Arthur is which graph he (Arthur) started with, G or H . But Arthur already knew which graph he started with! This means that, not only does Arthur gain no “understanding” of what makes G and H non-isomorphic, he does not even gain the ability to prove to a third party what Merlin proved to 58 Incidentally, this provides a good example of how notions from computational complexity theory can influence philosophy even just at the level of metaphor, forgetting about the actual results. In this essay, I didn’t try to collect such “metaphorical” applications of complexity theory, simply because there were too many of them! 59 Technically, the protocol is “ zero-knowledge,” meaning that Arthur learns nothing from his con- honest-verifier versation with Merlin besides the truth of the statement being proved, assuming Arthur follows the protocol correctly. If Arthur cheats—for example, by sending a graph K for which he doesn’t already know an isomorphism either to G or to H —then Merlin’s response could indeed tell Arthur something new. However, Goldreich, Micali, and Wigderson [66] also gave a more sophisticated proof protocol for graph non-isomorphism, which remains zero-knowledge even in the case where Arthur cheats. 38

39 him. This is another aspect of computational proofs that has no analogue with proof notions (1) or (2). One might complain that, as interesting as the zero-knowledge property is, so far we’ve only shown it’s achievable for an extremely specialized problem. And indeed, just like with factoring NP -complete integers, today there is strong evidence that the graph isomorphism problem is not , 60 61 However, in the same paper that gave the graph non-isomorphism protocol, Goldreich, [33]. Micali, and Wigderson [66] also gave a celebrated zero-knowledge protocol (now called the GMW ) for the -complete problems. By the definition of NP -complete (see Section 3.1), the protocol NP GMW protocol meant that every mathematical statement that has a conventional proof (say, in Zermelo-Fraenkel set theory) also has a zero-knowledge proof of comparable size! As an example application, suppose you’ve just proved the Riemann Hypothesis. You want to convince the experts of your triumph, but are paranoid about them stealing credit for it. In that case, “all” you need to do is (1) rewrite your proof in a formal language, (2) encode the result as the solution to an NP -complete problem, and then th (3) like a 16 -century court mathematician challenging his competitors to a duel, invite the experts to run the GMW protocol with you over the Internet! statistically certain Provided you answer all their challenges correctly, the experts can become that you possess a proof of the Riemann Hypothesis, without learning anything about that proof besides an upper bound on its length. Better yet, unlike the graph non-isomorphism protocol, the GMW protocol does not assume a super-powerful wizard—only an ordinary polynomial-time being who happens to know a proof of the relevant theorem. As a result, today the GMW protocol is much more than a theoretical curiosity: it and its variants have found major applications in Internet cryptography, where clients and servers often need to prove to each other that they are following a protocol correctly without revealing secret information as they do so. However, there is one important caveat: unlike the graph-nonisomorphism protocol, the GMW protocol relies essentially on a . For here is how the GMW protocol works: cryptographic hypothesis you (the prover) first publish thousands of encrypted messages, each one “committing” you to a randomly-garbled piece of your claimed proof. You then offer to decrypt a tiny fraction of those messages, as a way for skeptical observers to “spot-check” your proof, while learning nothing about th its structure besides the useless fact that, say, the 1729 step is valid (but how could it be not valid?). If the skeptics want to increase their confidence that your proof is sound, then you simply run the protocol over and over with them, using a fresh batch of encrypted messages each time. If the skeptics could decrypt all the messages in a single batch, then they could piece together your proof—but to do that, they would need to break the underlying cryptographic code. 60 Indeed, there is not even a consensus belief that graph isomorphism is outside P ! The main reason is that, in contrast to factoring integers, graph isomorphism turns out to be extremely easy . Indeed, finding in practice non-isomorphic graphs that can’t be distinguished by simple invariants is itself a hard problem! And in the past, several problems (such as linear programming and primality testing) that were long known to be “efficiently solvable for practical purposes” were eventually shown to be in P in the strict mathematical sense as well. 61 There is also strong evidence that there are short conventional proofs for graph non-isomorphism—in other words, that not just graph isomorphism but also graph non-isomorphism will ultimately turn out to be in NP [85]. 39

40 9.2 Other New Notions Let me mention four other notions of “proof” that complexity theorists have explored in depth over the last twenty years, and that might merit philosophical attention. • two (or Multi-prover interactive proofs [26, 20], in which Arthur exchanges messages with Here, Arthur might become more) computationally-powerful but untrustworthy wizards. convinced of some mathematical statement, but only under the assumption that the wizards each other during the protocol. (The usual analogy is to a police could not communicate with detective who puts two suspects in separate cells, to prevent them from coordinating their an- swers.) Interestingly, in some multi-prover protocols, even non-communicating wizards could successfully coordinate their responses to Arthur’s challenges (and thereby convince Arthur of a falsehood) through the use of [41]. However, other protocols are quantum entanglement conjectured to remain sound even against entangled wizards [84]. Probabilistically checkable proofs • [55, 18], which are mathematical proofs encoded in a special error-correcting format, so that one can become confident of their validity by checking only PCP (Probabilistically Checkable 10 or 20 bits chosen randomly in a correlated way. The [17, 50], one of the crowning achievements of complexity theory, says that Proofs) Theorem any mathematical theorem, in any standard formal system such as Zermelo-Fraenkel set theory, can be converted in polynomial time into a probabilistically-checkable format. • Quantum proofs [135, 6], which are proofs that depend for their validity on the output of a quantum computation—possibly, even a quantum computation that requires a special entan- n quantum bits might require ∼ 2 gled “proof state” fed to it as input. Because classical n bits to simulate, quantum proofs have the property that it might never be possible to list all the “steps” that went into the proof, within the constraints of the visible universe. For this reason, one’s belief in the mathematical statement being proved might depend on one’s belief in the correctness of quantum mechanics as a physical theory. • Computationally-sound proofs and arguments [35, 95], which rely for their validity on the assumption that the prover was limited to polynomial-time computations—as well as the mathematical conjecture that crafting a convincing argument for a falsehood would have taken the prover more than polynomial time. What implications do these new types of proof have for the foundations of mathematics? Do they merely make more dramatic what “should have been obvious all along”: that, as David Deutsch argues in The Beginning of Infinity [49], proofs are physical processes taking place in brains or computers, which therefore have no validity independent of our beliefs about physics? Are the issues raised essentially the same as those raised by “conventional” proofs that require extensive computations, like Appel and Haken’s proof of the Four-Color Theorem [13]? Or does appealing, in the course of a “mathematical proof,” to (say) the validity of quantum mechanics, the randomness of apparently-random numbers, or the lack of certain superpowers on the part of the prover represent something qualitatively new? Philosophical analysis is sought. 40

41 10 Complexity, Space, and Time What can computational complexity tell us about the nature of space and time? A first answer can be might be “not much”: after all, the definitions of standard complexity classes such as P shown to be insensitive to such details as the number of spatial dimensions, and even whether the 62 On the other hand, I think complexity theory does offer insight speed of light is finite or infinite. differences between space and time. about the The class of problems solvable using a polynomial amount of memory (but possibly an expo- 63 , for Polynomial Space. Examples of nential amount of time problems PSPACE ) is called PSPACE include simulating dynamical systems, deciding whether a regular grammar generates all possible strings, and executing an optimal strategy in two-player games such as Reversi, Connect Four, and 64 It is not hard to show that PSPACE is at least as powerful as NP : Hex. NP P PSPACE ⊆ EXP . ⊆ ⊆ EXP Here represents the class of problems solvable using an exponential amount of time, and also 65 Every one of the above containments is believed to possibly an exponential amount of memory. to be strict is P 6 = EXP , by an important 1965 be strict, although the only one currently proved , 67 66 . result of Hartmanis and Stearns [71] called the Time Hierarchy Theorem 62 More precisely, Turing machines with one-dimensional tapes are polynomially equivalent to Turing machines with -dimensional tapes for any k , and are also polynomially equivalent to random-access machines (which can “jump” k to any memory location in unit time, with no locality constraint). On the other hand, if we care about polynomial differences in speed, and especially if we want to study parallel computing models, details about the spatial layout of the computing and memory elements (as well as the speed of communication among the elements) can become vitally important. 63 Why “only” an exponential amount? Because a Turing machine with bits of memory can run for no more B B than 2 time steps. After that, the machine must either halt or else return to a configuration previously visited (thereby entering an infinite loop). 64 Note that, in order to speak about the computational complexity of such games, we first need to generalize them × n board! But if we do so, then for many natural games, the problem of determining which player has the to an n PSPACE PSPACE -complete (i.e., it captures the entire difficulty of the win from a given position is not only in , but PSPACE ). For example, Reisch [111] showed that this is true for Hex. class PSPACE chess × n board? That’s also in n —but as far as anyone to an What about a suitable generalization of Without such a knows, only if we impose a polynomial upper bound on the number of moves in a chess game. EXP -complete; with such a restriction, Storer [129] restriction, Fraenkel and Lichtenstein [60] showed that chess is PSPACE -complete. showed that chess is 65 p ( n ) ) “exponential” if it can be upper-bounded by 2 In this context, we call a function f ( n , for some polynomial p . Also, note that than exponential memory would be useless here, since a Turing machine that runs for T more T memory cells. time steps can visit at most 66 More generally, the Time Hierarchy Theorem shows that, if f and g are any two “sufficiently well-behaved” 2 3 n n  g ( n ) (for example: f ( n ( n f and g ( n ) = ) functions that satisfy ), then there are computational problems ) = solvable in ( n ) time but not in f g n ) time . The proof of this theorem uses diagonalization, and can be thought ( of as a scaled-down version of Turing’s proof of the unsolvability of the halting problem. That is, we argue that, if it were always possible to simulate a g ( n )-time Turing machine by an f ( n )-time Turing machine, then we could construct a n )-time machine that “predicted its own output in advance” and then output something else—thereby g ( causing a contradiction. 3 Using similar arguments, we can show (for example) that there exist computational problems solvable using n 2 n bits, and so on in most cases where we want to compare more versus less of the bits of memory but not using same computational resource. In complexity theory, the hard part is comparing two different resources: for example, ? ? NP = ), or classical versus problem), time versus space ( P PSPACE = P determinism versus nondeterminism (the ? quantum computation ( BPP = BQP ). For in those cases, diagonalization by itself no longer works. 67 The fact that P 6 = EXP has an amusing implication, often attributed to Hartmanis: namely, at least one of the 41

42 Notice, in particular, that P = NP implies P 6 = PSPACE . So while P 6 = PSPACE is not yet 6 proved, it is an extremely secure conjecture by the standards of complexity theory. In slogan form, complexity theorists believe that . space is more powerful than time Now, some people have asked how such a claim could possibly be consistent with modern physics. For didn’t Einstein teach us that space and time are merely two aspects of the same structure? One immediate answer is that, even within relativity theory, space and time are not interchangeable: space has a positive signature whereas time has a negative signature. In complexity theory, the reuse difference between space and time manifests itself in the straightforward fact that you can 68 the same memory cells over and over, but you can’t reuse the same moments of time. Suppose that Yet, as trivial as that observation sounds, it leads to an interesting thought. the laws of physics let us travel backwards in time. In such a case, it’s natural to imagine that PSPACE time would become a “reusable resource” just like space is—and that, as a result, arbitrary computations would fall within our grasp. But is that just an idle speculation, or can we rigorously justify it? 10.1 Closed Timelike Curves Philosophers, like science-fiction fans, have long been interested in the possibility of closed timelike 69 curves (CTCs), which arise in certain solutions to Einstein’s field equations of general relativity. grandfather On a traditional understanding, the central philosophical problem raised by CTCs is the paradox . This is the situation where you go back in time to kill your own grandfather, therefore you are never born, therefore your grandfather is not killed, therefore you are born, and so on. Does this contradiction immediately imply that CTCs are impossible? No, it doesn’t: we can only conclude that, if CTCs exist, then the laws of physics must somehow prevent grandfather paradoxes from arising. How could they do so? One classic illustration is that “when you go back in time to try and kill your grandfather, the gun jams”—or some other “unlikely” event inevitably occurs to keep the state of the universe consistent. But why should we imagine that such a convenient “out” will always be available, in every physical experiment involving CTCs? Normally, we like to imagine that we have the freedom to design an experiment however we wish, without Nature imposing conditions on the experiment (for example: “every gun must jam sometimes”) whose reasons can only be understood in terms of distant or hypothetical events. In his 1991 paper “Quantum mechanics near closed timelike lines,” Deutsch [47] gave an elegant three inequalities P 6 = (i) NP (ii) 6 = PSPACE NP PSPACE 6 = EXP (iii) must be true, even though proving any one of them to be true individually would represent a titanic advance in mathematics! P 6 = NP . Of all our hundreds of unproved The above observation is sometimes offered as circumstantial evidence for beliefs about inequalities between pairs of complexity classes, a large fraction of them must be correct, simply to avoid contradicting the hierarchy theorems. So then why not P 6 = NP in particular (given that our intuition there is stronger than our intuitions for most of the other inequalities)? 68 See my blog post www.scottaaronson.com/blog/?p=368 for more on this theme. 69 Though it is not known whether those solutions are “physical”: for example, whether or not they can survive in a quantum theory of gravity (see [97] for example). 42

43 proposal for eliminating grandfather paradoxes. In particular he showed that, as long as we assume the laws of physics are quantum-mechanical (or even just classically probabilistic), every experiment involving a CTC admits at least one fixed point : that is, a way to satisfy the conditions is the mapping from quantum S of the experiment that ensures consistent evolution. Formally, if states to themselves induced by “going around the CTC once,” then a fixed point is any quantum 70 such that S ( ρ ) = ρ mixed state ρ . The existence of such a ρ follows from simple linear-algebraic arguments. As one illustration, the “resolution of the grandfather paradox” is now that you are 2, and if you are born, you go back in time to kill your grandfather—from / born with probability 1 2, and so on. Merely by treating states / which it follows that you are born with probability 1 71 to be in quantum mechanics ), we have made the as probabilistic (as, in some sense, they have evolution of the universe consistent. But Deutsch’s account of CTCs faces at least three serious difficulties. The first difficulty is that : there could be many mixed states ρ such that S ( unique ) = ρ , and the fixed points might not be ρ grandfather then the question arises of how Nature chooses one of them. To illustrate, consider the : a bit anti-paradox ∈ { 0 , 1 } that travels around a CTC without changing. We can consistently b assume b = 0, or b = 1, or any probabilistic mixture of the two—and unlike the usual situation in physics, here there is no possible boundary condition that could resolve the ambiguity. The second difficulty, pointed out Bennett et al. [28], is that Deutsch’s proposal violates the statistical interpretation of quantum mixed states. So for example, if half of an entangled pair | 0 〉 〉 | 0 〉 1 + | 1 〉 | A B A B √ 2 is placed inside the CTC, while the other half remains outside the CTC, then the process of finding As a “remedy” for this a fixed point will “break” the entanglement between the two halves. problem, Bennett et al. suggest requiring the CTC fixed point ρ to be independent of the entire rest of the universe. To my mind, this remedy is so drastic that it basically amounts to defining CTCs out of existence! Motivated by these difficulties, Lloyd et al. [91] recently proposed a completely different account postselected teleportation . Lloyd et al.’s account avoids both of the problems of CTCs, based on 72 above—though perhaps not surprisingly, introduces other problems of its own. My own view, for whatever it is worth, is that Lloyd et al. are talking less about “true” CTCs as I would understand simulate CTCs in certain the concept, as about postselected quantum-mechanical experiments that interesting respects. If there are any controversies in physics that call out for expert philosophical attention, surely this is one of them. 70 In quantum mechanics, a can be thought of as a classical probability distribution over quantum states. mixed state However, an important twist is that the same mixed state can be represented by different probability distributions: | 0 〉 + | 1 〉 √ is physically indistinguishable from an equal mixture of for example, an equal mixture of the states | 0 〉 and | 1 〉 2 0 〉−| 1 〉 | √ and . This is why mixed states are represented mathematically using Heisenberg’s density matrix formalism. 2 71 In more detail, Deutsch’s proposal works if the state space consists of classical probability distributions D or quantum mixed states ρ , but not if it consists of pure states | ψ 〉 . Thus, if one believed that only pure states were fundamental in physics, and that probability distributions and mixed states always reflected subjective ignorance, one might reject Deutsch’s proposal on that ground. 72 In particular, in Lloyd et al.’s proposal, the only way to deal with the grandfather paradox is by some variant of “the gun jams”: there are evolutions with no consistent solution, and it needs to be postulated that the laws of physics are such that they never occur. 43

44 10.2 The Evolutionary Principle Yet so far, we have not even mentioned what I see as the main difficulty with Deutsch’s account a fixed point might require Nature to solve an astronomically-hard of CTCs. This is that finding computational problem! To illustrate, consider a science-fiction scenario wherein you go back in time and dictate Shakespeare’s plays to him. Shakespeare thanks you for saving him the effort, publishes verbatim the plays that you dictated, and centuries later the plays come down to you, whereupon you go back in time and dictate them to Shakespeare, etc. Notice that, in contrast to the grandfather paradox, here there is no logical contradiction: the story as we told it is entirely consistent. But most people find the story “paradoxical” anyway. Hamlet gets written, without anyone ever doing the work of writing it! As After all, somehow Deutsch [47] perceptively observed, if there is a “paradox” here, then it is not one of logic but of Specifically, the story violates a commonsense principle that we can computational complexity . loosely articulate as follows: Knowledge requires a causal process to bring it into existence. Like many other important principles, this one might not be recognized as a “principle” at all before we contemplate situations that violate it! Deutsch [47] calls this principle the Evolutionary Principle (EP). Note that some version of the EP was invoked both by William Paley’s blind- watchmaker argument, and (ironically) by the arguments of Richard Dawkins [45] and other atheists against the existence of an intelligent designer. In my survey article “ NP -Complete Problems and Physical Reality” [4], I proposed and defended NP Hardness Assumption : a complexity-theoretic analogue of the EP, which I called the NP There is no physical means to solve -complete problems in polynomial time. 6 = NP The above statement implies P , but is stronger in that it encompasses probabilistic comput- ing, quantum computing, and any other computational model compatible with the laws of physics. NP Hardness Assumption, analyses of claimed See [4] for a survey of recent results bearing on the counterexamples to the assumption, and possible implications of the assumption for physics. 10.3 Closed Timelike Curve Computation violate the NP Hardness As- But can we show more rigorously that closed timelike curves would sumption? Indeed, let us now show that, in a universe where arbitrary computations could be performed inside a CTC, and where Nature had to find a fixed point for the CTC, we could solve NP -complete problems using only polynomial resources. n NP -complete problem instance by a function f : { 0 ,..., 2 We can model any − 1 } → { 0 , 1 } , which maps each possible solution x x is valid, or to 0 if x is invalid. (Here, for to the bit 1 if n x with the nonnegative integer that x encodes convenience, we identify each -bit solution string n ∈{ 0 ,..., in binary.) Our task, then, is to find an x − 1 } such that f ( x ) = 1. We can solve this 2 problem with just a single evaluation to f , provided we can run the following computer program C inside a closed timelike curve [36, 4, 7]: n x 0 ,..., Given input ∈{ − 1 } : 2 If f ( x ) = 1 , then output x n Otherwise, output ( x + 1) mod 2 44

45 Assuming there exists at least one x f ( x ) = 1, the only fixed points of C —that is, the such that C ’s output to equal its input—are for to input, and output, such a valid solution only ways for C C ’s output register “as if by magic.” (If there are no valid solutions, , which therefore appears in x C ’s fixed points will simply be uniform superpositions or probability distributions over all then n 0 ,..., 2 1 − x } .) ∈{ Extending the above idea, John Watrous and I [7] (following a suggestion by Fortnow) recently showed that a CTC computer in Deutsch’s model could solve all problems in . (Recall that PSPACE is believed to be even larger than .) More surprisingly, we also showed that PSPACE PSPACE NP constitutes the limit on what can be done with a CTC computer; and that this is true whether the CTC computer is classical or quantum. One consequence of our results is that the “na ̈ıve intuition” about CTC computers—that their effect would be to “make space and time equivalent 73 as computational resources”—is ultimately correct, although not for the na ̈ıve reasons. A second, amusing consequence is that, once closed timelike curves are available, switching from classical to quantum computers provides no additional benefit! not just It is important to realize that our algorithms for solving hard problems with CTCs do boil down to “using huge amounts of time to find the answer, then sending the answer back in time to before the computer started.” For even in the exotic scenario of a time travel computer, we still require that all resources used inside the CTC (time, memory, etc.) be polynomially-bounded. Thus, the ability to solve hard problems comes solely from causal consistency : the requirement that Nature must find some evolution for the CTC computer that avoids grandfather paradoxes. In Lloyd et al.’s alternative account of CTCs based on postselection [91], hard problems can be solved, though for different reasons. In particular, building on an earlier result of mine also [5], Lloyd et al. show that the power of their model corresponds to a complexity class called PP (Probabilistic Polynomial-Time), which is believed to be strictly smaller than PSPACE but strictly NP . Thus, one might say that Lloyd et al.’s model “improves” the computational larger than situation, but not by much! So one might wonder: is there any way that the laws of physics could allow CTCs, without opening the door to implausible computational powers? There remains at least one interesting 74 possibility, which was communicated to me by the philosopher Tim Maudlin. Maybe the laws of physics have the property that, no matter what computations are performed inside a CTC, Nature always has an “out” that avoids the grandfather paradox, but also avoids solving hard computational problems—analogous to “the gun jamming” in the original grandfather paradox. Such an out might involve (for example) an asteroid hitting the CTC computer, or the computer failing for other mysterious reasons. Of course, any computer in the physical world has some nonzero probability of failure, but ordinarily we imagine that the failure probability can be made negligibly small. However, in situations where Nature is being “forced” to find a fixed point, maybe “mysterious computer failures” would become the norm rather than the exception. To summarize, I think that computational complexity theory changes the philosophical issues raised by time travel into the past. While discussion traditionally focused on the grandfather 73 Specifically, it is not true that in a CTC universe, a Turing machine tape head could just travel back and forth in time the same way it travels back and forth in space. If one thinks this way, then one really has in mind a second, “meta-time,” while the “original” time has become merely one more dimension of space. To put the point cyclic , time would still retain its directionality . This is the reason differently: even though a CTC would make time why, if we want to show that CTC computers have the power of PSPACE , we need a nontrivial argument involving causal consistency. 74 This possibility is also discussed at length in Deutsch’s paper [47]. 45

46 paradox, we have seen that there is no shortage of ways for Nature to avoid logical inconsistencies, even in a universe with CTCs. The “real” problem, then, is how to escape the paradoxes other that arise in the course of taming the grandfather paradox! Probably foremost among those is the “computational complexity paradox,” of NP -complete and even harder problems getting solved as if by magic. 11 Economics In classical economics, agents are modeled as rational, Bayesian agents who take whatever actions will maximize their expected utility E } [ over ( ω )], given their subjective probabilities { p U ω Ω ∈ ω ω ∈ Ω 75 of the world. all possible states This, of course, is a caricature that seems almost designed ω has to be attacked, and it been attacked from almost every angle. For example, humans are not even close to rational Bayesian agents, but suffer from well-known cognitive biases, as explored by Kahneman and Tversky [81] among others. Furthermore, the classical view seems to leave no room for critiquing people’s beliefs (i.e., their prior probabilities) or their utility functions as irrational— yet it is easy to cook up prior probabilities or utility functions that would lead to behavior that almost anyone would consider insane. A third problem is that, in games with several cooperating or competing agents who act simultaneously, classical economics guarantees the existence of at least one Nash equilibrium among the agents’ strategies. But the usual situation is that there are multiple equilibria, and then there is no general principle to predict which equilibrium will prevail, even though the choice might mean the difference between war and peace. Computational complexity theory can contribute to debates about the foundations of economics by showing that, even in the idealized situation of rational agents who all have perfect information about the state of the world, it will often be computationally intractable for those agents to act Of course, some version of this observation has been in accordance with classical economics. recognized in economics for a long time. There is a large literature on bounded rationality (going back to the work of Herbert Simon [122]), which studies the behavior of economic agents whose decision-making abilities are limited in one way or another. 11.1 Bounded Rationality and the Iterated Prisoners’ Dilemma As one example of an insight to emerge from this literature, consider the Finite Iterated Prisoner’s N , which is finite Dilemma. This is a game where two players meet for some fixed number of rounds and common knowledge between the players. In each round, both players can either “Defect” or “Cooperate” (not knowing the other player’s choice), after which they receive the following payoffs: Defect Cooperate 2 2 0 Defect , 1 4 , 1 1 Cooperate 0 , 4 3 , 3 1 Both players remember the entire previous history of the interaction. It is clear that the players will be jointly best off (i.e., will maximize the sum of their payoffs) if they both cooperate. Unfortunately, it is equally clear that, if the players meet for only one 75 Here we assume for simplicity that the set Ω of possible states is countable; otherwise we could of course use a continuous probability measure. 46

47 round ( N equilibrium . Regardless of what Player 1 does, Player = 1), then cooperation is not an 2 will do better by defecting than by cooperating, and vice versa. On the other hand, were unknown or infinite , then the players could if the number of rounds N rationally decide to cooperate, similarly to how humans decide to cooperate in real life. That is, Player 1 reasons that if he defects, then Player 2 might retaliate by defecting in future rounds, and Player 2 reasons likewise. Both players conclude that, over the long run, they’ll do best even just for themselves by cooperating. N known , the The “paradox” is now the following: as soon as the number of rounds becomes above reasoning completely collapses! For clearly, neither player can have anything to lose by in the very last round , when the other player no longer has any chance to retaliate. So defecting if both players are rational, then that is exactly what they will do. But if both players know that N both of them will defect in round , then neither one has anything to lose by defecting in round N − 1 either . Of course, they can continue inductively like this all the way back to the first round. We therefore get the “prediction” that both players will defect in every round, even though that is neither in the players’ own interests, nor what actual humans do in experiments. And all because the number of rounds was known : something that seems intuitively like it shouldn’t make any N difference! In 1985, Neyman [99] proposed an ingenious resolution of this paradox. Specifically, he showed that if the two players have sufficiently small memories —technically, if they are finite automata with k states, for 2 ≤ k < N —then cooperation becomes an equilibrium once again! The basic intuition is that, if both players lack enough memory to count up to N , and both of them know that, and both know that they both know that, and so on, then the inductive argument in the last paragraph fails, since it assumes intermediate strategies that neither player can implement. some of the counterintuitive conclusions of classical While complexity considerations vanquish economics, equally interesting to me is that they do not vanquish others. As one example, I showed in [3] that Robert Aumann’s celebrated agreement theorem [19]—perfect Bayesian agents with com- mon priors can never “agree to disagree”—persists even in the presence of limited communication between the agents. There are many other interesting results in the bounded rationality literature, too many to do them justice here (but see Rubinstein [113] for a survey). On the other hand, “bounded ratio- nality” is something of a catch-all phrase, encompassing almost every imaginable deviation from rationality—including human cognitive biases, limits on information-gathering and communication, and the restriction of strategies to a specific form (for example, linear threshold functions). Many of these deviations have little to do with computational complexity . So the question re- per se mains of whether computational complexity specifically can provide new insights about economic behavior. 11.2 The Complexity of Equilibria There are some very recent advances suggesting that the answer is yes. Consider the problem n × of finding an equilibrium of a two-player game, given the payoff matrix as input. In the n special case of zero-sum games (which von Neumann studied in 1928), it has long been known how to solve this problem in an amount of time polynomial in n , for example by reduction to linear programming. But in 2006, Daskalakis, Goldberg, and Papadimitriou [44] (with improvements by Chen and Deng [39]) proved the spectacular result that, for a general (not necessarily zero-sum) two-player game, finding a Nash equilibrium is “ PPAD -complete.” Here PPAD (“Polynomial Parity 47

48 Argument, Directed”) is, roughly speaking, the class of all search problems for which a solution is guaranteed to exist for the same combinatorial reason that every game has at least one Nash equilibrium. Note that finding a Nash equilibrium NP -complete, for the technical reason cannot be is a class of problems, and the answer to the decision problem “does this game NP decision that have a Nash equilibrium?” is always yes. But Daskalakis et al.’s result says (informally) that the a Nash problem is “as close to search problem of -complete as it could possibly be,” finding NP PPAD -completeness results are now known subject to its decision version being trivial. Similar for other fundamental economic problems, such as finding market-clearing prices in Arrow-Debreu markets [38]. Of course, one can debate the economic relevance of these results: for example, how often does 76 to be inherent in economic equilibrium theorems the computational hardness that we now know But one can similarly debate the economic relevance of the actually rear its head in practice? In my opinion, if the theorem that Nash equilibria exist is equilibrium theorems themselves! considered relevant to debates about (say) free markets versus government intervention, then the finding those equilibria is theorem that -complete should be considered relevant also. PPAD 12 Conclusions The purpose of this essay was to illustrate how philosophy could be enriched by taking compu- tational complexity theory into account, much as it was enriched almost a century ago by taking computability theory into account. In particular, I argued that computational complexity provides new insights into the explanatory content of Darwinism, the nature of mathematical knowledge and proof, computationalism, syntax versus semantics, the problem of logical omniscience, debates sur- rounding the Turing Test and Chinese Room, the problem of induction, the foundations of quantum mechanics, closed timelike curves, and economic rationality. Indeed, one might say that the “real” question is which philosophical problems don’t have are My own opinion is that there probably important computational complexity aspects! such problems (even within analytic philosophy), and that one good candidate is the problem of what we should take as “bedrock mathematical reality”: that is, the set of mathematical statements that are objectively true or false, regardless of whether they can be proved or disproved in a given formal M either accepts, rejects, system. To me, if we are not willing to say that a given Turing machine or runs forever (when started on a blank tape)—and that which one it does is an objective fact, independent of our formal axiomatic theories, the laws of physics, the biology of the human brain, we have no basis to talk about any of those other things (axiomatic cultural conventions, etc.—then M ’s resource requirements are irrelevant theories, the laws of physics, and so on). Furthermore, 10000 2 steps, its output is as mathematically definite as if it had here: even if M only halts after 2 77 halted after 10 steps. Can we say anything general about when a computational complexity perspective is helpful in philosophy, and when it isn’t? Extrapolating from the examples in this essay, I would say that computational complexity tends to be helpful when we want to know whether a particular fact 76 Subject, as usual, to widely-believed complexity assumptions. 77 The situation is very different for mathematical statements like the Continuum Hypothesis, which can’t obviously be phrased as predictions about idealized computational processes (since they’re not expressible by first-order or even second-order quantification over the integers). For those statements, it really is unclear to me what one means by their truth or falsehood apart from their provability in some formal system. 48

49 does any explanatory work : Sections 3.2, 3.3, 4, 6, and 7 all provided examples of this. Other “philosophical applications” of complexity theory come from the Evolutionary Principle and the NP we believe that certain problems are Hardness Assumption discussed in Section 10.2. If computationally intractable, then we may be able to draw interesting conclusions from that belief about economic rationality, quantum mechanics, the possibility of closed timelike curves, and other issues. un helpful when we only want to By contrast, computational complexity tends to be know whether a particular fact “determines” another fact, and don’t care about the length of the inferential chain. 12.1 Criticisms of Complexity Theory Despite its explanatory reach, complexity theory has been criticized on various grounds. Here are four of the most common criticisms: (1) Complexity theory only makes asymptotic statements (statements about how the resources n needed to solve problem instances of size n goes to infinity). But as a matter of scale as logic, asymptotic statements need not have for the finite values any implications whatsoever n , 000) that humans care actually about, nor can any finite amount of experimental (say, 10 of 78 data confirm or refute an asymptotic claim. (2) Many of (what we would like to be) complexity theory’s basic principles, such as 6 = NP , are P currently unproved mathematical conjectures, and will probably remain that way for a long time. (3) Complexity theory focuses on only a limited type of computer—the serial, deterministic Tur- ing machine—and fails to incorporate the “messier” computational phenomena found in na- ture. (4) Complexity theory studies only the behavior of algorithms, and does not address worst-case whether that behavior is representative, or whether it merely reflects a few “pathological” P 6 = NP inputs. So for example, even if most , there might still be excellent heuristics to solve instances of NP -complete problems that actually arise in practice; complexity theory tells us nothing about such possibilities one way or the other. For whatever it’s worth, criticisms (3) and (4) have become much less accurate since the 1980s. As discussed in this essay, complexity theory has by now branched out far beyond deterministic Turing machines, to incorporate (for example) quantum mechanics, parallel and distributed com- puting, and stochastic processes such as Darwinian evolution. Meanwhile, although worst-case complexity remains the best-understood kind, today there is a large body of work—much of it average-case hardness of computational problems, for driven by cryptography—that studies the various probability distributions over inputs. And just as almost all complexity theorists believe that P 6 = NP , so almost all subscribe to the stronger belief that there exist hard-on-average NP problems—indeed, that belief is one of the underpinnings of modern cryptography. A few prob- lems, such as calculating discrete logarithms, are even known to be just as hard on random inputs 78 For a beautiful example of a non-asymptotic, “concrete” lower bound on circuit size—illustrating how objection (1) can often be answered with enough hard work—see Stockmeyer and Meyer [128]. 49

50 as they are on the hardest possible input (though whether such “worst-case/average-case equiva- NP -complete problem remains a major open question). For these reasons, lence” holds for any although speaking about average-case rather than worst-case complexity would complicate some of 79 See Bogdanov the arguments in this essay, I don’t think it would change the conclusions much. and Trevisan [32] for an excellent recent survey of average-case complexity, and Impagliazzo [79] for an evocative discussion of complexity theory’s “possible worlds” (for example, the “world” where NP -complete problems turn out to be hard in the worst case but easy on average). The broader point is that, even if we admit that criticisms (1)-(4) have merit, that does not give us a license to dismiss complexity-theoretic arguments whenever we dislike them! In science, we only ever deal with imperfect, approximate theories—and if we reject the conclusions of the best approximate theory in some area, then the burden is on us to explain why. To illustrate, suppose you believe that quantum computers will never give a speedup over classical computers for any practical problem. Then as an explanation for your stance, you might assert any of the following: (a) Quantum mechanics is false or incomplete, and an attempt to build a scalable quantum computer would instead lead to falsifying or extending quantum mechanics itself. (b) There exist polynomial-time classical algorithms for factoring integers, and for all the other problems that admit polynomial-time quantum algorithms. (In complexity terms, the classes and BQP are equal.) BPP (c) The “constant-factor overheads” involved in building a quantum computer are so large as to negate their asymptotic advantages, for any problem of conceivable human interest. (d) While we don’t yet know which of (a)-(c) holds, we can know on some a priori ground that at least one of them has to hold. The point is that, even if we can’t answer every possible shortcoming of a complexity-theoretic clarify the choices : to force people to lay some cards on the table, analysis, we can still use it to committing themselves either to a prediction that might be falsified or to a mathematical conjecture that might be disproved. Of course, this is a common feature of scientific theories, not something all specific to complexity theory. If complexity theory is unusual here, it is only in the number of “predictions” it juggles that could be confirmed or refuted by mathematical proof (and indeed, only 80 by mathematical proof). 12.2 Future Directions Even if the various criticisms of complexity theory don’t negate its relevance, it would be great to address those criticisms head-on—and more generally, to get a clearer understanding of the rela- tionship between complexity theory and the real-world phenomena that it tries to explain. Toward that end, I think the following questions would all benefit from careful philosophical analysis: 79 On the other hand, it would presuppose that we knew how to define reasonable probability distributions over inputs. But as discussed in Section 4.3, it seems hard to explain what we mean by “structured instances,” or “the types of instances that normally arise in practice.” 80 One other example that springs to mind, of a scientific theory many of whose “predictions” take the form of mathematical conjectures, is string theory. 50

51 • What is the empirical status of asymptotic claims? What sense can we give to an asymp- totic statement “making predictions,” or being supported or ruled out by a finite number of observations? • How can we explain the empirical facts on which complexity theory relies: for example, that 10000 n . n 0000001 or 1 we rarely see algorithms, or that the computational problems humans care about tend to organize themselves into a relatively-small number of equivalence classes? • Short of proof, how do people form intuitions about the truth or falsehood of mathematical are those intuitions, in cases such as P 6 = NP ? conjectures? What If we think of complexity classes ( • , NP , etc.) as collections of problems, then it becomes P harder to understand results like those of Baker, Gill, and Solovay [21], which says that A A P there exists an “oracle” 6 = A such that (and furthermore, this remains true even if NP P = NP in the “real” world). In philosophical terms, should we think of a complexity class as corresponding to its definition rather than its extension ? • Do the conceptual conclusions that people sometimes want to draw from conjectures such as 6 NP or BPP 6 = BQP —for example, about the nature of mathematical creativity or the P = interpretation of quantum mechanics—actually depend on those conjectures being true? Are there easier-to-prove statements that would arguably support the same conclusions? • If P 6 = NP , then how have humans managed to make such enormous mathematical progress, even in the face of the general intractability of theorem-proving? Is there a “selection effect,” by which mathematicians favor problems with special structure that makes them easier to solve than arbitrary problems? If so, then what does this structure consist of? In short, I see plenty of scope for the converse essay to this one: “Why Computational Com- plexity Theorists Should Care About Philosophy.” 13 Acknowledgments I am grateful to Oron Shagrir for pushing me to finish this essay, for helpful comments, and for suggesting Section 7.2; to Alex Byrne for suggesting Section 6; to Agust ́ın Rayo for suggesting Section 5; and to David Aaronson, Eric Allender, Seamus Bradley, Alessandro Chiesa, Terrence Cole, Michael Collins, Andy Drucker, Ron Fagin, Michael Forbes, Oded Goldreich, Bob Harper, Gil Kalai, Dana Moshkovitz, Jan Arne Telle, Dylan Thurston, Ronald de Wolf, Avi Wigderson, and Joshua Zelinsky for their feedback. References [1] S. Aaronson. Shor, I’ll do it (weblog entry). www.scottaaronson.com/blog/?p=208. [2] S. Aaronson. Multilinear formulas and skepticism of quantum computing. In Proc. ACM STOC , pages 118–127, 2004. quant-ph/0311039. [3] S. Aaronson. The complexity of agreement. In Proc. ACM STOC , pages 634–643, 2005. ECCC TR04-061. 51

52 [4] S. Aaronson. NP-complete problems and physical reality. SIGACT News , March 2005. quant- ph/0502072. [5] S. Aaronson. Quantum computing, postselection, and probabilistic polynomial-time. Proc. Roy. Soc. London , A461(2063):3473–3482, 2005. quant-ph/0412187. [6] S. Aaronson and G. Kuperberg. Quantum versus classical proofs and advice. Theory of Com- puting , 3(7):129–157, 2007. Previous version in Proceedings of CCC 2007. quant-ph/0604056. [7] S. Aaronson and J. Watrous. Closed timelike curves make quantum and classical computing equivalent. Proc. Roy. Soc. London , (A465):631–647, 2009. arXiv:0808.2669. ACM [8] S. Aaronson and A. Wigderson. Algebrization: a new barrier in complexity theory. Trans. on Computation Theory , 1(1), 2009. Conference version in Proc. ACM STOC 2008. [9] M. N. Kayal, and N. Saxena. PRIMES is in P. Agrawal, www.cse.iitk.ac.in/users/manindra/primality.ps, 2002. [10] D. Aharonov. Quantum computation - a review. In Dietrich Stauffer, editor, Annual Review of Computational Physics , volume VI. 1998. quant-ph/9812037. [11] D. Angluin. Learning regular sets from queries and counterexamples. Information and Com- putation , 75(2):87–106, 1987. [12] D. Angluin, J. Aspnes, J. Chen, and Y. Wu. Learning a circuit by injecting values. J. Comput. , 75(1):60–77, 2009. Earlier version in STOC’2006. Sys. Sci. Every planar map is four-colorable . American Mathematical Society, [13] K. Appel and W. Haken. 1989. [14] B. Applebaum, B. Barak, and D. Xiao. On basing lower-bounds for learning on worst-case Proc. IEEE FOCS assumptions. In , pages 211–220, 2008. [15] S. Arora and B. Barak. Complexity Theory: A Modern Approach . Cambridge University Press, 2009. Online draft at www.cs.princeton.edu/theory/complexity/. [16] S. Arora, R. Impagliazzo, and U. Vazirani. Relativizing versus nonrelativizing techniques: the role of local checkability. Manuscript, 1992. [17] S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. J. ACM , 45(3):501–555, 1998. [18] S. Arora and S. Safra. Probabilistic checking of proofs: a new characterization of NP. J. ACM , 45(1):70–122, 1998. [19] R. J. Aumann. Agreeing to disagree. Annals of Statistics , 4(6):1236–1239, 1976. [20] L. Babai, L. Fortnow, and C. Lund. Nondeterministic exponential time has two-prover inter- active protocols. Computational Complexity , 1(1):3–40, 1991. [21] T. Baker, J. Gill, and R. Solovay. Relativizations of the P=?NP question. SIAM J. Comput. , 4:431–442, 1975. 52

53 [22] E. B. Baum. What Is Thought? Bradford Books, 2004. [23] R. Beals, H. Buhrman, R. Cleve, M. Mosca, and R. de Wolf. Quantum lower bounds by polynomials. J. ACM , 48(4):778–797, 2001. Earlier version in IEEE FOCS 1998, pp. 352-361. quant-ph/9802049. Current [24] P. Beame and T. Pitassi. Propositional proof complexity: past, present, and future. , pages 42–70, 2001. Trends in Theoretical Computer Science [25] S. Bellantoni and S. A. Cook. A new recursion-theoretic characterization of the polytime , 2:97–110, 1992. Earlier version in STOC 1992, p. functions. Computational Complexity 283-293. [26] M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson. Multi-prover interactive proofs: how to remove the intractability assumptions. In , pages 113–131, 1988. Proc. ACM STOC [27] C. Bennett, E. Bernstein, G. Brassard, and U. Vazirani. Strengths and weaknesses of quantum SIAM J. Comput. computing. , 26(5):1510–1523, 1997. quant-ph/9701001. [28] C. H. Bennett, D. Leung, G. Smith, and J. A. Smolin. Can closed timelike curves or nonlin- ear quantum mechanics improve quantum state discrimination or help solve hard problems? , 103(170502), 2009. arXiv:0908.3023. Phys. Rev. Lett. SIAM J. Comput. , 26(5):1411– [29] E. Bernstein and U. Vazirani. Quantum complexity theory. 1473, 1997. First appeared in ACM STOC 1993. [30] N. Block. Searle’s arguments against cognitive science. In J. Preston and M. Bishop, editors, Views into the Chinese Room: New Essays on Searle and Artificial Intelligence , pages 70–79. Oxford, 2002. [31] A. Blumer, A. Ehrenfeucht, D. Haussler, and M. K. Warmuth. Learnability and the Vapnik- J. ACM Chervonenkis dimension. , 36(4):929–965, 1989. [32] A. Bogdanov and L. Trevisan. Average-case complexity. Foundations and Trends in Theo- retical Computer Science , 2(1), 2006. ECCC TR06-073. [33] R. B. Boppana, J. H ̊astad, and S. Zachos. Does co-NP have short interactive proofs? Inform. Proc. Lett. , 25:127–132, 1987. [34] R. Bousso. Positive vacuum energy and the N-bound. J. High Energy Phys. , 0011(038), 2000. hep-th/0010252. [35] G. Brassard, D. Chaum, and C. Cr ́epeau. Minimum disclosure proofs of knowledge. J. Comput. Sys. Sci. , 37(2):156–189, 1988. [36] T. Brun. Computers with closed timelike curves can solve hard problems. Foundations of Physics Letters , 16:245–253, 2003. gr-qc/0209061. [37] D. J. Chalmers. The Conscious Mind: In Search of a Fundamental Theory . Oxford, 1996. [38] X. Chen, D. Dai, Y. Du, and S.-H. Teng. Settling the complexity of Arrow-Debreu equilibria in markets with additively separable utilities. In Proc. IEEE FOCS , pages 273–282, 2009. 53

54 [39] X. Chen and X. Deng. Settling the complexity of two-player Nash equilibrium. In Proc. IEEE , pages 261–271, 2006. FOCS [40] C. Cherniak. Computational complexity and the universal acceptance of logic. The Journal , 81(12):739–758, 1984. of Philosophy [41] R. Cleve, P. Høyer, B. Toner, and J. Watrous. Consequences and limits of nonlocal strate- , pages 236–249, 2004. quant- Proc. IEEE Conference on Computational Complexity gies. In ph/0404076. Proceedings of Logic, [42] A. Cobham. The intrinsic computational difficulty of functions. In Methodology, and Philosophy of Science II . North Holland, 1965. Minds and Machines [43] J. Copeland. Hypercomputation. , 12:461–502, 2002. [44] C. Daskalakis, P. W. Goldberg, and C. H. Papadimitriou. The complexity of computing Commun. ACM a Nash equilibrium. , 52(2):89–97, 2009. Earlier version in Proceedings of STOC’2006. [45] R. Dawkins. The God Delusion . Houghton Mifflin Harcourt, 2006. [46] D. C. Dennett. . Simon & Darwin’s Dangerous Idea: Evolution and the Meanings of Life Schuster, 1995. [47] D. Deutsch. Quantum mechanics near closed timelike lines. Phys. Rev. D , 44:3197–3217, 1991. [48] D. Deutsch. The Fabric of Reality . Penguin, 1998. The Beginning of Infinity: Explanations that Transform the World [49] D. Deutsch. . Allen Lane, 2011. J. ACM , 54(3):12, 2007. [50] I. Dinur. The PCP theorem by gap amplification. [51] A. Drucker. Multiplying 10-digit numbers using Flickr: the power of recognition memory. people.csail.mit.edu/andyd/rec method.pdf, 2011. [52] R. Fagin. Finite model theory - a personal perspective. Theoretical Comput. Sci. , 116:3–31, 1993. [53] R. Fagin and J. Y. Halpern. Belief, awareness, and limited reasoning. Artificial Intelligence , 34(1):39–76, 1987. Reasoning about Knowledge . The MIT [54] R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Press, 1995. [55] U. Feige, S. Goldwasser, L. Lov ́asz, S. Safra, and M. Szegedy. Interactive proofs and the hardness of approximating cliques. J. ACM , 43(2):268–292, 1996. [56] R. P. Feynman. Simulating physics with computers. Int. J. Theoretical Physics , 21(6-7):467– 488, 1982. 54

55 [57] L. Fortnow. The role of relativization in complexity theory. Bulletin of the EATCS , 52:229– 244, February 1994. [58] L. Fortnow. One complexity theorist’s view of quantum computing. Theoretical Comput. Sci. , 292(3):597–610, 2003. [59] L. Fortnow and S. Homer. A short history of computational complexity. Bulletin of the EATCS , (80):95–133, 2003. [60] A. Fraenkel and D. Lichtenstein. Computing a perfect strategy for nxn chess requires time exponential in n. Journal of Combinatorial Theory A , 31:199–214, 1981. Proc. ACM STOC , pages [61] C. Gentry. Fully homomorphic encryption using ideal lattices. In 169–178, 2009. [62] O. Goldreich. On quantum computing. www.wisdom.weizmann.ac.il/ ̃oded/on-qc.html, 2004. Computational Complexity: A Conceptual Perspective [63] O. Goldreich. . Cambridge University Press, 2008. Earlier version at www.wisdom.weizmann.ac.il/ ̃oded/cc-drafts.html. A Primer on Pseudorandom Generators . American Mathematical Society, [64] O. Goldreich. 2010. www.wisdom.weizmann.ac.il/ ̃oded/PDF/prg10.pdf. [65] O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. J. ACM , 33(4):792–807, 1984. [66] O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM , 38(1):691–729, 1991. [67] S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. , 18(1):186208, 1989. SIAM J. Comput. Fact, Fiction, and Forecast . Harvard University Press, 1955. [68] N. Goodman. [69] P. Graham. How to do philosophy. www.paulgraham.com/philosophy.html, 2007. [70] L. K. Grover. A fast quantum mechanical algorithm for database search. In Proc. ACM STOC , pages 212–219, 1996. quant-ph/9605043. [71] J. Hartmanis and R. E. Stearns. On the computational complexity of algorithms. Transactions of the American Mathematical Society , 117:285–306, 1965. [72] J. Haugeland. Syntax, semantics, physics. In J. Preston and M. Bishop, editors, Views into the Chinese Room: New Essays on Searle and Artificial Intelligence , pages 379–392. Oxford, 2002. [73] J. Hintikka. Knowledge and Belief . Cornell University Press, 1962. [74] M. Hogarth. Non-Turing computers and non-Turing computability. Biennial Meeting of the Philosophy of Science Association , 1:126–138, 1994. 55

56 [75] A. S. Holevo. Some estimates of the information transmitted by quantum communication channels. , 9:177–183, 1973. English translation. Problems of Information Transmission Classical and Quantum [76] G. ’t Hooft. Quantum gravity as a dissipative deterministic system. Gravity , 16:3263–3279, 1999. gr-qc/9903084. . 1748. 18th.eserver.org/hume- An Enquiry concerning Human Understanding [77] D. Hume. enquiry.html. Descriptive Complexity . Springer, 1998. [78] N. Immerman. [79] R. Impagliazzo. A personal view of average-case complexity. In Proc. IEEE Conference on , pages 134–147, 1995. Computational Complexity [80] R. Impagliazzo and A. Wigderson. P=BPP unless E has subexponential circuits: derandom- izing the XOR Lemma. In , pages 220–229, 1997. Proc. ACM STOC Judgment Under Uncertainty: Heuristics and [81] D. Kahneman, P. Slovic, and A. Tversky. . Cambridge University Press, 1982. Biases [82] M. J. Kearns and L. G. Valiant. Cryptographic limitations on learning Boolean formulae and J. ACM finite automata. , 41(1):67–95, 1994. [83] M. J. Kearns and U. V. Vazirani. An Introduction to Computational Learning Theory . MIT Press, 1994. [84] J. Kempe, H. Kobayashi, K. Matsumoto, B. Toner, and T. Vidick. Entangled games are hard to approximate. SIAM J. Comput. , 40(3):848–877, 2011. Earlier version in FOCS’2008. arXiv:0704.2903. [85] A. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs un- SIAM J. Comput. , 31:1501–1526, 2002. Earlier less the polynomial-time hierarchy collapses. version in ACM STOC 1999. J. ACM [86] R. E. Ladner. On the structure of polynomial time reducibility. , 22:155–171, 1975. [87] D. Leivant. A foundational delineation of poly-time. Information and Computation , 110(2):391–420, 1994. Earlier version in LICS (Logic In Computer Science) 1991, p. 2-11. [88] H. J. Levesque. Is it enough to get the behavior right? In Proceedings of IJCAI , pages 1439–1444, 2009. [89] L. A. Levin. Polynomial time and extravagant models, in The tale of one-way functions. Problems of Information Transmission , 39(1):92–103, 2003. cs.CR/0012023. [90] M. Li and P. M. B. Vit ́anyi. An Introduction to Kolmogorov Complexity and Its Applications (3rd ed.) . Springer, 2008. [91] S. Lloyd, L. Maccone, R. Garcia-Patron, V. Giovannetti, and Y. Shikano. The quantum mechanics of time travel through post-selected teleportation. Phys. Rev. D , 84(025007), 2011. arXiv:1007.2615. 56

57 [92] J. R. Lucas. Minds, machines, and G ̈odel. Philosophy , 36:112–127, 1961. Amer- [93] N. D. Mermin. From cbits to qbits: teaching computer scientists quantum mechanics. ican J. Phys. , 71(1):23–30, 2003. quant-ph/0207118. . Cambridge University Press, Quantum Computer Science: An Introduction [94] N. D. Mermin. 2007. , 30(4):1253–1298, 2000. [95] S. Micali. Computationally sound proofs. SIAM J. Comput. . Oxford University Press, 2011. The Nature of Computation [96] C. Moore and S. Mertens. [97] M. S. Morris, K. S. Thorne, and U. Yurtsever. Wormholes, time machines, and the weak Phys. Rev. Lett. , 61:1446–1449, 1988. energy condition. Noˆus [98] A. Morton. Epistemic virtues, metavirtues, and computational complexity. , 38(3):481– 502, 2004. [99] A. Neyman. Bounded complexity justifies cooperation in the finitely repeated prisoners’ Economics Letters , 19(3):227–229, 1985. dilemma. Quantum Computation and Quantum Information [100] M. Nielsen and I. Chuang. . Cambridge University Press, 2000. [101] C. H. Papadimitriou. Computational Complexity . Addison-Wesley, 1994. [102] I. Parberry. Knowledge, understanding, and computational complexity. In D. S. Levine and W. R. Elsberry, editors, Optimality in Biological and Artificial Networks? , pages 125–144. Lawrence Erlbaum Associates, 1997. [103] R. Penrose. . Oxford, 1989. The Emperor’s New Mind Shadows of the Mind: A Search for the Missing Science of Consciousness [104] R. Penrose. . Oxford, 1996. J. ACM , [105] L. Pitt and L. Valiant. Computational limitations on learning from examples. 35(4):965–984, 1988. [106] C. Pomerance. A tale of two sieves. Notices of the American Mathematical Society , 43(12):1473–1485, 1996. [107] H. Putnam. Representation and Reality . Bradford Books, 1991. [108] Y. Rabinovich and A. Wigderson. Techniques for bounding the convergence rate of genetic Random Structures and Algorithms , 14(2):111–138, 1999. algorithms. [109] R. Raz. Exponential separation of quantum and classical communication complexity. In Proc. ACM STOC , pages 358–367, 1999. [110] A. A. Razborov and S. Rudich. Natural proofs. J. Comput. Sys. Sci. , 55(1):24–35, 1997. [111] S. Reisch. Hex is PSPACE-complete. Acta Informatica , 15:167–191, 1981. 57

58 [112] H. E. Rose. Subrecursion: Functions and Hierarchies . Clarendon Press, 1984. Modeling Bounded Rationality . MIT Press, 1998. [113] A. Rubinstein. , (7):281– [114] A. Sch ̈onhage and V. Strassen. Schnelle Multiplikation großer Zahlen. Computing 292, 1971. [115] J. Searle. Minds, brains, and programs. , 3(417-457), 1980. Behavioral and Brain Sciences [116] J. Searle. The Rediscovery of the Mind . MIT Press, 1992. J. ACM , 39(4):869–877, 1992. [117] A. Shamir. IP=PSPACE. [118] S. M. Shieber. The Turing test as interactive proof. Noˆus , 41(4):686–713, 2007. [119] P. W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. , 26(5):1484–1509, 1997. Earlier version in IEEE SIAM J. Comput. FOCS 1994. quant-ph/9508027. Minds and Machines [120] H. T. Siegelmann. Neural and super-Turing computing. , 13(1):103–114, 2003. [121] D. Simon. On the power of quantum computation. In Proc. IEEE FOCS , pages 116–123, 1994. [122] H. A. Simon. A behavioral model of rational choice. The Quarterly Journal of Economics , 69(1):99–118, 1955. [123] M. Sipser. The history and status of the P versus NP question. In , pages Proc. ACM STOC 603–618, 1992. [124] M. Sipser. . Course Technology, Introduction to the Theory of Computation (Second Edition) 2005. [125] J. H ̊astad, R. Impagliazzo, L. A. Levin, and M. Luby. A pseudorandom generator from any SIAM J. Comput. one-way function. , 28(4):1364–1396. [126] R. Stalnaker. The problem of logical omniscience, I and II. In Context and Content: Essays on Intentionality in Speech and Thought , Oxford Cognitive Science Series, pages 241–273. Oxford University Press, 1999. [127] L. J. Stockmeyer. Classifying the computational complexity of problems. J. Symbolic Logic , 52(1):1–43, 1987. [128] L. J. Stockmeyer and A. R. Meyer. Cosmological lower bound on the circuit complexity of a small problem in logic. J. ACM , 49(6):753–784, 2002. [129] J. A. Storer. On the complexity of chess. J. Comput. Sys. Sci. , 27(1):77–100, 1983. [130] A. M. Turing. Computing machinery and intelligence. Mind , 59:433–460, 1950. [131] L. G. Valiant. A theory of the learnable. Communications of the ACM , 27:1134–1142, 1984. 58

59 [132] L. G. Valiant. Evolvability. J. ACM , 56(1), 2009. Conference version in MFCS 2007. ECCC TR06-120. [133] V. Vapnik and A. Chervonenkis. On the uniform convergence of relative frequencies of events , 16(2):264–280, 1971. to their probabilities. Theory of Probability and its Applications . MIT Press, 1997. A Logical Journey: From G ̈odel to Philosophy [134] H. Wang. Proc. IEEE FOCS , [135] J. Watrous. Succinct quantum proofs for properties of finite groups. In pages 537–546, 2000. cs.CC/0009002. Encyclopedia of Complexity and Systems [136] J. Watrous. Quantum computational complexity. In . Springer, 2008. arXiv:0804.3401. Science Wigderson. P, NP and [137] A. - a computational complex- mathematics ity perspective. In Proceedings of the International Congress of Math- EMS ematicians , pages 665–712. (Madrid) Publishing House, 2007. 2006 www.math.ias.edu/ ̃avi/PUBLICATIONS/MYPAPERS/W06/w06.pdf. [138] A. Wigderson. Knowledge, creativity and P versus NP, 2009. www.math.ias.edu/ ̃avi/PUBLICATIONS/MYPAPERS/AW09/AW09.pdf. Commu- [139] E. Wigner. The unreasonable effectiveness of mathematics in the natural sciences. nications in Pure and Applied Mathematics , 13(1), 1960. [140] R. de Wolf. Philosophical applications of computational learning theory: Chomskyan innateness and occam’s razor. Master’s thesis, Erasmus University, 1997. home- pages.cwi.nl/ ̃rdewolf/publ/philosophy/phthesis.pdf. 59

Related documents

June2018CUR

June2018CUR

CHANCELLOR'S UNIVERSITY REPORT JUNE 25 2018

More info »
WG1AR5 Chapter06 FINAL

WG1AR5 Chapter06 FINAL

Carbon and Other Biogeochemical Cycles Coordinating Lead Authors: Philippe Ciais (France), Christopher Sabine (USA) Lead Authors: Govindasamy Bala (India), Laurent Bopp (France), Victor Brovkin (Germa...

More info »
republic

republic

The Republic By Plato http://www.idph.net 18 de maio de 2002

More info »
Experimental and Theoretical Statics of Liquids Subject to Molecular Forces Only

Experimental and Theoretical Statics of Liquids Subject to Molecular Forces Only

EXPERIMENTAL AND THEORETICAL STATICS OF LIQUIDS SUBJECT TO MOLECULAR FORCES ONLY, BY J. PLATEAU Professor of the University of Ghent, Member of the Academy of Belgium, Correspondent of the Institute o...

More info »
SellarsPhilSciImage

SellarsPhilSciImage

PHILOSOPHY AND THE SCI ENTIFIC IMAGE OF MAN 2 e presupposes a great deal of knowledg that, and it is obvious that the reflective knowing one's way around in the scheme of things, which is the aim of A...

More info »
Which Concepts Should We Use?: Metalinguistic Negotiations and The Methodology of Philosophy

Which Concepts Should We Use?: Metalinguistic Negotiations and The Methodology of Philosophy

Inquiry , 2015 Vol. 58, Nos. 7 – 8, 828 – 874, http://dx.doi.org/10.1080/0020174X.2015.1080184 Which Concepts Should We Use?: Metalinguistic Negotiations and The Methodology of Philosophy DAVID PLUNKE...

More info »
HOW IS THIS PAPER PHILOSOPHY?

HOW IS THIS PAPER PHILOSOPHY?

- 29 Volume 3, No. 1 (2012 ): 03 Comparative Philosophy Open Access / ISSN 2151 - 6014 www.comparativephilosophy.org HOW IS THIS PAPER PHILOSOPHY? KRISTIE DOTSON ly assess answers a call made by Anita...

More info »
six books

six books

SIX BOOKS OF THE COMMONWEALTH by ODIN JEAN B M. J. TOOLEY Abridged and translated by L BL ACKWEL L OXF ORD BASI PRINT ED IN GREAT BR ITAI N IN THE CI TY OF OX FORD AT T HE AL DEN PRESS BOUND BY ALL BI...

More info »
CHURCH HISTORY IN THE FULNESS OF TIMES Student Manual

CHURCH HISTORY IN THE FULNESS OF TIMES Student Manual

HURCH C ISTORY H HURCH C H ISTORY IN THE ULNESS F IN THE ULNESS F OF T IMES OF IMES T S tudent M anual S anual M tudent RELIGION 341 THROUGH 343

More info »
Non Philosophy and Art Practice

Non Philosophy and Art Practice

Bibliography NON- Lehmann, Hans-Thies. . Translated Postdramatic Theatre by Karen Jürs-Munby. Abingdon: Routledge, 2006. PHILOSOPHY Endnotes AND ART Hans-Thies Lehmann, 1 , Postdramatic Theatre trans....

More info »
dissertation

dissertation

WHAT DOES IT MEAN TO SAY THAT LOGIC IS FORMAL? by John Gordon MacFarlane A.B., Philosophy, Harvard College, 1991 M.A., Philosophy, University of Pittsburgh, 1994 M.A., Classics, University of Pittsbur...

More info »
Microsoft Word   Table of Contents Full Report with ES.doc

Microsoft Word Table of Contents Full Report with ES.doc

Stern Review: The Economics of Climate Change PAGE TABLE OF CONTENTS i-xxvii Executive Summary i Preface & Acknowledgements iv Introduction to Review vi Summary of Conclusions Part I Climate change: o...

More info »
A Human Health Perspective On Climate Change Full Report

A Human Health Perspective On Climate Change Full Report

A Human Health Perspective On Climate Change A Report Outlining the Research Needs on the Human Health Effects of Climate Change APRIL 22, 2010 Published by Environmental Health Perspectives and the N...

More info »
The Philosophical Disenfranchisement of Art

The Philosophical Disenfranchisement of Art

Ben Sonnenberg !"#$%"&'()(*"&+,'$-&)#./0,.+"&)#1#.2$(/$302 342"(05)67$302"40$89$-,.2( :(40+#7$ >('[email protected](9$A$5:*0&.B=$CDEF6=$**9$CGCHCED ;0,.<$:20##2=$ %4I'&)"#<$IJ7$K#.$:(..#.I#0B :2,I'#$LMN7$ http:/...

More info »
The End of Art: A Philosophical Defense

The End of Art: A Philosophical Defense

Wesleyan University !"#$%&'$()$*+,-$*$."/0(1(2"/340$5#)#&1# *6,"(+718-$*+,"6+$9:$54&,( ;(6+3#-$ ?(0:[email protected]>$B(:$C>$!"#D#$E116#[email protected]$54&,($4&'$</1$9+/,/31-$*+, </1,(+=$4&'$!"#(+=>$ </1,(+=>$</1,(+/(F+42"=$...

More info »
WG1AR5 Chapter13 FINAL

WG1AR5 Chapter13 FINAL

Sea Level Change 13 Coordinating Lead Authors: John A. Church (Australia), Peter U. Clark (USA) Lead Authors: Anny Cazenave (France), Jonathan M. Gregory (UK), Svetlana Jevrejeva (UK), Anders Leverman...

More info »