 # The Reachability of Computer Programs

Would it be possible to explain the emergence of new computational ideas using the computation itself? Would it be feasible to describe the discovery process of new algorithmic solutions using only mathematics? This study is the first effort to analyze the nature of such inquiry from the viewpoint of effort to find a new algorithmic solution to a given problem. We define program reachability as a probability function whose argument is a form of the energetic cost (algorithmic entropy) of the problem.

## Authors

##### This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

## 1 Introduction

“The Golden Egg was not as exciting as the goose that laid it.” This phrase, uttered by Ray J. Solomonoff solomonoff2011algorithmic , is the motto of this paper. We want to investigate the possibility of explaining the discovery of computational ideas using only physics, and computation itself. The starting point of this investigation lies in the question:

“How difficult it is for a programmer discover a new algorithmic solution for a problem?”

It is necessary to explain in what sense the words “algorithmic solution” and “problem” we are using here. To clarify the meaning of these terms, we will take the Fibonacci’s series as an example. The first ten elements of it are completely well-described by the string:

 0,1,1,2,3,5,8,13,21,34

The program that prints the string above is an algorithmic solution for the problem. The question “how to generate the string that represents the first ten terms of the Fibonacci series?” represents this latter problem. Simplifying the problem; we considered the string itself as the actual problem. Thus, find an algorithmic solution is to discover a program for (to print) a problem (string).

The aim of this paper is to analyze the phenomenon of new programs emergence (discovery by a programmer) in the physical world. We follow the train of thought contained in deutsch1985quantum ; deutsch2000machines , which argues that computers are physical objects, computations are physical processes, and they exist in the real-world. The fact that such appearance occurs in our material universe and not in an entirely symbolic space, disassociated from any physical meaning, is our primary postulate. We will show that the logical consequence of this physicalist argument is that the probability of a programmer to develop a new program obeys an underlying entropy principle, informational at first, but also thermodynamics; thus leading us to the concept of algorithmic reachability.

As initial motivation, we concentrate on minimum length program probability. The objective is to associate the (incomputable) minimum length program concept with our reachability investigation. We will show that the emergence of minimum programs (determined by the Kolmogorov complexity) is a function of the energetic intrinsic cost to achieve it.

This paper is structured as follows. Section 2 describes the notations and theoretical preliminaries; Section 3 presents the motivation of this work; Section 4 presents the programs reachability, and Section 5 describes its formulation. The Section 6 discusses the results presented in the previous section and the last section presents the conclusion.

## 2 Background

In this section, we give several definitions and notations required for the adequate discussion of the present article. We assume that the reader is familiar with basics concepts of physics, calculus, and probability.

### 2.1 General definitions

###### Definition 1 (Lambert W function).

Let be the sets of all real numbers. For , the Lambert function borwein1999emerging is defined as the inverse of the function and solves :

 W(x)eW(x)=x. (1)

has the following behavior:

• For , is a real positive function.

• For , is a multivalued application with two negative real-valued branches: and corless1996lambertw .

• For , .

• For , .

• For , is not defined in .

###### Definition 2 (Binary string and its length).

Let the binary alphabet and be the sets of all natural numbers. A string is any finite sequence of juxtaposed elements of the alphabet and its length is the number of the elements composing .

###### Definition 3 (Reflexive and Transitive Closure over the alphabet).

Let be the set of all strings with length . The reflexive and transitive closure over the alphabet is defined as . In a similar way, defined as the set of all nonempty strings over

###### Definition 4 (Prefix String and Prefix free set).

Let the strings . In this context, a string is a prefix of r () if there exists such that . A set is called a prefix-free set when, , is only true for , .

### 2.2 Kolmogorov Complexity

###### Definition 5 (Solution for ρ).

Given a universal Turing machine

and an input (program) in the form of a binary string , if generates the string as output, so that:

 U(ς)=ρ

then, we say that is a solution for the problem .

###### Definition 6 (Chaitin machine and minimal program).

If a universal Turing machine is defined for but not defined for any prefix of , then this machine is called a Chaitin machine solovay2000version and denoted by . Any accepted by is referred to as a minimal program.

###### Definition 7 (ρ-solution set).

The set of all minimal programs that are solutions of the problem is called a -solution set. The set is assumed to be finite.

###### Definition 8 (Kolmogorov complexity).

(downey2010algorithmic, , p. 110) Given a problem with , the Kolmogorov complexity of is defined as:

 K(ρ)=min{l(ςi):U(ςi)=ρ} (2)

Thus, the Kolmogorov complexity of is the -solution set element with the lowest length. now denotes this program.

### 2.3 Boltzmann and Shannon entropy

###### Definition 9 (Shannon’s Entropy).

(gray1990entropy, , p. 18) For a finite sample space , let

be a random variable taking values in

for all . The Shannon entropy is defined as:

 H=−∑xp(x)log2p(x) (3)
###### Definition 10 (Boltzmann’s Entropy).

For the special case of a discrete state space with L the counting measure defined as , that is, the number of elements in the set ,

 SB(x)=(kln2)logd(Γx) (4)

is the familiar form of the Boltzmann entropy li2013introduction .

The Gibbs entropy is defined as:

 SG=klnΓ (5)

Where , which is the number of microstates corresponding to a given macrostate of a thermodynamic system (kondepudi2014modern, , p. 457), and is the Boltzmann constant.

#### 2.3.1 Relationship between Gibb’s and Shannon’s Entropy

.

The relation between the Expression 3 and 5 is expressed as follow cover2012elements ; atlan1972organisation :

 SB=Hkln2 (6)

Following (li2013introduction, , section 8.6), the previous approaches (Gibbs, or Boltzmann’s entropy and Shannon’s entropy concepts) “treated entropy as a probabilistic notion; in particular, each microstate of a system has entropy equal to . However, it is desirable to find a concept of entropy that assigns a nonzero entropy to each microstate of the system, as a measure of its individual disorder.” The last sentence means that Kolmogorov Complexity may be used to define the concept of algorithmic entropy.

Considering that any measure of an individual microstate of a particular system has nonzero entropy and supposing that this system in equilibrium is described by the encoding

of the approximated macroscopic parameters, one can estimate the entropy of the macrostate encapsulating the microstate. The algorithmic entropy of the macrostate of a system is given by

, where is the prefix complexity of , and . Here SB(x) is the Boltzmann entropy of the system constrained by macroscopic parameters x, and k is Boltzmann’s constant. The physical version of algorithmic entropy is defined as .

Gibbs entropy is essentially the average algorithmic entropy. Let . Thus, the algorithmic entropy is a generalization of the prefix complexity li2013introduction . The connection between Gibbs entropy and is given by the equation below li2013introduction :

 SA(w)=(kln2)Hμ(w),SAn(w)=(kln2)Hnμ(w) (7)

### 2.4 Probability and physical work

###### Definition 11 (Conditional Probability).

(stark2002probability, , p. 22) Let be a countable set of disjoint an exhaustive events, where each is associated with a probability such that and . Given as any event with , for all :

 P(ei|y)=P(y|ei)P(ei)P(y) (8)

The relationship physical work and Shannon entropy variation. In a thermodynamic process (sonntag1998fundamentals, , p. 375) with a transition taking a system from an initial state to some final state , the work extracted in the course of the transition can be expressed regarding thermodynamic entropy as follow zurek1989algorithmic :

 ΔW=TΔE (9)

Where is the temperature in Kelvin scale on Equation 9 which is valid for a process with a transition sufficiently slowly to be thermodynamically reversible and with the internal energy of the system considered as constant. The variation is the difference between the entropy of the final and initial statelavenda2010new :

 ΔE=S2−S1 (10)

By Expression 6, we have:

 ΔW=kTln2ΔH (11)

## 3 Motivation

In computer science, new programs are often designed. Some of them solve problems for which there was already a solution found. Some algorithms exist for centuries, some others are very recent, turning them part of the solution cluster for a determined class of computable problems. Others, on the other hand, provide more efficient solutions from the asymptotic analysis point of view, that is, on the amount of time or memory needed to get an output.

Regardless of the asymptotic complexity class, each computable problem has an algorithmic solution whose length in bits, prefix-free, is minimum, and that value is the Kolmogorov complexity equation 2 itself. The concept of Kolmogorov complexity relates to the principle of Occam’s Razor (li2013introduction, , p. 260). We can interpret such principle as a method for selecting solutions, where the simplest case, among other explanations for the phenomenon under study, has to be chosen. Such principle presupposes the existence of a simplicity criterion in nature and Kolmogorov complexity appears as an objective measure to treat such simplicity. Unfortunately, for all string , it is not possible to calculate , due to its incomputability.

However, nothing prevents us from investigating the occurrence probability of , i.e. the probability that a programmer develops exactly the minimum program, the element of -solution set with the smallest length in bits, whose length value is precisely the Kolmogorov Complexity .

### 3.1 Postulated Effects

In the introduction, we said that our main postulate is the fact that the discovery of new programs happens in the real-world. Although it is a postulate, we need to analyze most strictly the influence of this statement in our investigation of the minimum length program occurrence probability.

The expression of such probability involves the -solution set and the derivation of Bayes’ conditional rule (Expression 8):

 P(ςkol)=P(ςkol|ρ)⋅P(ρ)P(ρ|ςkol) (12)

The postulated effects of the Expression 12 are given below:

##### Postulated Effect 1

: the term is the occurrence probability of given the occurrence of . However it is necessary to put this term in a complete context: is the probability of a Chaitin machine , whose input is , generates the string as output. The program is the minimum length program that generates . It generates and no other. It does not run forever, because is an element of and not an arbitrary program. Thus, for , . In this manner, Expression 12 takes the form :

 P(ςkol)=P(ςkol|ρ)⋅P(ρ) (13)
##### Postulated Effect 2

: the term is the occurrence probability of given the occurrence of . At the same time, (for every ), which means that represents the probability that the Chaitin machine have generated the string from the occurrence of the input .

The construction (or reification) of a program comes from after a problem attestation by a witness. The fact that problem can be described as a binary string is a consequence of it being noticed and somehow recorded by a group of witnesses that agree among themselves about its existence, and also how to represent it. Therefore, we can only talk about the situations where there is absolute certainty of the occurrence of , that is, the situation where this occurrence is a prerequisite, where we have:

 P(ςkol|ρ)=P(ςkol) (14) P(ςkol|¬ρ)=0 (15) P(ρ)=1 (16)

Thus, we have that the occurrence probability of is always an a posteriori probability, conditioned by the problem of generating as an output of by input.

## 4 The reachability of a program

However, what does to calculate the probability of a programmer to develop the program mean, in a semantic sense? Programs are not balls in a ballot box. They are not cards of a deck, dice faces or -particles shocking against a photographic plate. The Kolmogorov’s complexity study about randomness nature is independent of the way can be obtained grunwald2004shannon . A raffle, a toss of a coin, or occurrence frequency calculus does not give the presence or absence of , and it neither appears spontaneously in the input tape of the Chaitin machine .

The objective of a program is to solve a problem. There is a pragmatical necessity that the developed program generates a string . Thus, the existence of already implies (by its definition) the occurrence of a nontrivial phenomenon of compression that led to its description from . To be the input of there exist a sequence of events involved in the conception of the program and its constructive generation. This situation shows to us that the probability of a programmer developing a new algorithmic solution to a given problem correlates with the necessity notion, in an Aristotelian sense.

Necessary is that which can not be otherwise (Halper2008-HALOAM, , p. 468). The necessity is what makes it impossible for something to be other than it is (aristotle1998metaphysics, , p. 120). Necessity is the reverse of the impossibility. To illustrate the concept of impossibility, take the following illustration: a man can return to his childhood home and remodel it so that it looks, as much as possible, like what he has in mind, but he still cannot go back in the past. Hence, going backward to relive his past consists in an impossibility.

The path followed by the programmer to find a new algorithmic solution lies under necessity constraints. In this sense, the Occam’s razor is necessity principle, as well Shannon’s entropy is a measure of the average impossibility (ben2008farewell, , p. 141)

. Thus, there is a necessary way for a programmer to develop a new program and, at this moment, we need a clear connection between occurrence probability and necessity concept, to get the fact and showing how much it is necessary, what needs to happen and cannot be otherwise. This connection element is the

probability 14. We will not associate its meaning with a raffle phenomenon, but we will see it as a measure of the program reachability.

## 5 The program reachability calculus

In this way, we define the program reachability of as the quantifiable relative necessity of an input for a Chaitin machine when generates as its output. Such relative necessity is represented by . However, a probability that cannot be expressed has no purpose. Thus, it is necessary to describe a way to obtain the program reachability expression regarding necessity or impossibility. The Shannon entropy, defined in 9 will provide us this way. For this, let us take the random variable constituted by the enumeration elements of . The image space of is expressed by:

 IX={1,2,…,i,…,m} (17)

For such random variable, with respective probabilities , we have the Shannon entropy associated, given by the expression 3:

 H=−[p(1)log2p(1)+⋯+p(i)log2p(i)+⋯+p(m)log2p(m)] (18)

Now, let us isolate the sum component concerning to :

 H+[p(1)log2p(1)+⋯+p(m)log2p(m)]=−p(i)log2p(i) (19)

At this point, it is important to note that the component

 [p(1)log2p(1)+⋯+p(i−1)log2p(i−1)+p(i+1)log2p(i+1)+⋯+p(m)log2p(m)] (20)

The right side of equation 19 refers to the entropy of a random variable , which represents the enumeration of , without its th element. The space image description may be expressed as:

 IX′=IX−{i} (21)

Such variable also has its own Shannon entropy, and the expression of this entropy is the component , which will call . Thus, replacing the expression 19, we have:

 p(i)log2p(i)=−(H−H′) (22)

Another way to envision equation 22 is to consider it as describing the energy fluctuations by means of the difference on the entropy of the function that describes the program , such that .

Equation 22 is non-linear. To determine is necessary to deal with this non-linearity. Lambert function, described in Definition 1, is an important mathematical tool which allows the analytic solutions for a broad range of mathematical problems brito2008euler , including the solution of equation (for ), which is corless1993lambert :

 xlogax=b⟺x=eW(alnb) (23)

Moreover, this is exactly the form of Equation 22. To simplify the analysis, we will denominate the expression , the entropy variation, as . Notwithstanding, represents the occurrence probability of the event . Thus, with proper algebraic manipulation, for all (including the program ) we have:

 P(ςi)=expW(−\mathrsfsH(ςi)ln2) (24)

As the entropy is positive, the domain of the function will be negative, which will yield a negative number for the function. Hence taking the branch we’ll rewrite it as:

 P(ςi)=exp−∥W−1(−\mathrsfsH(ςi)ln2)∥ (25)

Nevertheless we have an equation for that maps a semi-measure for the probability distribution over the finite event set, and it yields values ranging from . Moreover, we can normalize it to become an actual measure for the probability stating: . In this case we actually have a probability distribution measure for the events, and .

## 6 Results discussion

### 6.1 Bounds on reachability function domain

We need to analyze the behavior of , impose no restrictions other than those typical of the analyzed function. Because the characteristics of Lambert function described in 1, the following domain restrictions for function are needed:

 −1e≤−\mathrsfsH(ςi)ln2≤0 (26)

which implies:

 0≤\mathrsfsH(ςi)≤1eln2 (27)

Since , we may rewrite Inequality 27 as

 0≤\mathrsfsH(ςi)⪅0.5307 Figure 2: Graph of the function P(ςi). In x-axis, we have the values of \mathrsfsH(ςi)

Consider equations (22) and (25) regarding a learning process for the algorithm reachability. We can apply equation (25

) to reach a better program in a similar way the gradient descent algorithm is applied to machine learning algorithms. There is an algorithmic entropy associated with the process of learning

li2013introduction ; Baez2010 ; Betti2016 .

One important feature of this approach on the Principle of Least Cognitive Action Betti2016 is that gradient descent algorithm can be derived from the principle.

In this sense, we envision the exponential of the Lambert W function as a matching loss for the learning algorithm auer1996 , but it is not convex, besides being continuous, for the domain (borwein2016, , Proposition ).

Since Lambert function is not convex, but continuous for the domain ; our proposal for the probability semi-measure is , which is bounded by the negative exponential of the Lambert’s function. Proposition 7 from borwein2016 deals with it:

###### Lemma 1.

is convex. (This is proposition 7 from borwein2016 )

###### Proof.

See proof of proposition 7 on borwein2016

Hence we have:

###### Theorem 1.

Let

be a loss function as

, then is a matching loss.

###### Proof.

From Property of auer1996 we have this strong claim: is continuous and bounded. And from Theorem 5.1 of auer1996 if a loss function follows the property then it is a matching loss.

To prove the theorem we make:

which is convex in by Lemma 1 (Proposition of borwein2016 ). Hence, by Theorem 5.1 of auer1996 , is a matching loss function. ∎

With these equations, our approach yields a theoretically sound method for the reachability calculus for a program. Nonetheless, Lambert W function is not entirely computable, for instance, , Chaitin’s incomputable constant.

The simpler algorithm to reach a program builds all programs of the same size and checks them all; afterward, switches them to an immediately smaller size. On a subsequent step, the algorithm produces the smallest program only when there is no transformation left to reduce the size unless there is an informed hypotheses search-space. This process produces a meaningful result that is: the smallest program is not necessarily the most accessible one.

Consider now that one method that defines an algorithm which is guided by the least energy cost given by Equation 25, applying a gradient descent. From this method we may argue its connection with the well-known Levin-Search algorithm levin1973 ; li2013introduction since we also provide a search method (reachability), but for a program.

### 6.2 The Demiurge

The connection between the concepts of probability and necessity does not eliminate the question of spontaneous generation of programs: after all, who is responsible for creating new programs, since their creation does not originate from throwing dices or tossing coins? Thus, beyond the concept of reachability, we need a constructive cause, a responsible agent, a being that we call Demiurge. Consider this being as a version of Maxwell’s demon. We can also understand the following digression from the arguments and measures exposed in berut2012experimental .

The philosopher Plato (in his dialog Timaeus) (ross1951plato, , p. 120) described the Demiurge (which in Greek means “craftsman”) as a world-generation entity, sometimes represented as endowed with only limited abilities. The Demiurge shapes the cosmos via imposing pre-existing form on matter, according to some ideal and perfect model o2015demiurge . However, although it has such capacity, the Demiurge is not omnipotent, omnipresent and omniscient.

The use of Demiurge in this paper has no intention of inserting any supernatural element in this discussion. The use of this term allows us to establish a cause for the generation of programs without the need of discussing the nature of this cause (for instance, whether the Demiurge is a machine or not), only its functions. In principle, the Demiurge is a physical system.

Thus, our Demiurge (represented by symbol ) has the ability of “to bring” new algorithmic solutions for a problem . However, the Demiurge action as the “discoverer” of a new solution for the problem involves an effort to carry out its function. There must be an energy consumption; which means that it needs to realize work to discover a new program .

Such fact has its effects on Expression 24, which states that the reachability of a program is a function of the entropy variation (represented by in Expression 11 and, since Expression 24, represented by ). However, we know (by Definitions 9 and 11) that is possible to describe an entropy variation in function of extracted work.

 \mathrsfsH(ςi)=ΔWkTln2 (28)

Similarly to what was made with the definition of , we will describe the variation of the work in terms of as follows:

 ΔW=\mathrsfsE(ςi) (29)

As the Demiurge is the responsible for this work and the variation of entropy is associated to the program reachability as well, the entropy variation of Expression 24 we may substitute it by the right side of Expression 28.This results in:

 P(ςi|D)=eW(−\mathrsfsE(ςi)/kT) (30)

The new version presented above makes the connection between the program reachability and the process of discovering new programs by the Demiurge . Through this; we can observe that each solution to is associated with a determined quantity of energy expended to generate it. For the Expression 30, the options for the energy values have their boundaries well determined (by Expression 27). Inside these limits, depending on the quantity of work available (and the amount of work realized by the Demiurge), we may have a bigger or smaller probability of reaching a new solution.

## 7 Conclusion

As stated in the introduction of this paper our goal was to set an abstraction for algorithmic discovery bounded by its reachability and its size. The idea behind the proposal is to view different programs simply as modified versions of the same basic program, this way any transformation between programs of the same size will not demand more energy to occur. However, to generate programs in a smaller size, it is necessary to apply work of the order as stated on expression 28. This result agrees with the Landauer’s principle berut2012experimental .

The simpler algorithm is then to build all programs of the same size and check them all, afterward switch them to an immediately smaller size. The next step of the algorithm produces the smallest program only when there is no transformation left to reduce the size unless there is an informed hypotheses search-space. This result means that generically speaking the smallest program not necessarily is the most accessible one.

At this point the Demiurge cuts the knot by applying the work difference to the problem as an entropy result, thus producing an informed search on a non-informed hypotheses search-space. In fact using a gradient descent by Equation 25. We can envision this idea as applying a Kolmogorov complexity measure, using the Lambert function, at each transformation step of a program, seeking a path around the lower complexity programs.

### 7.1 Future Investigation

The presented results of this work span a series of connections to some areas that deserve further investigation. There are associations between temperature and entropy of a system in  (Wallace2005, , Section 2.1.11) through the thermodynamics’s concept of microstates, and there is a study of these thermodynamics’s concepts to algorithmic context Baez2010 , but it is yet to be connected to this work.

Still, in the line of states, the correlation between the current work and the minimum amount of states of a Turing machine must also be drawn. Such study is of interest not only because of the Kolmogorov complexity, one of the central arguments of this research, but also to define the theoretical lower-bound of Turing-machine states for any given program specification; this kind of information is useful, for instance, to study certain properties of specific algorithms such as the Busy Beaver Yedidia2016 .

Last but not the least, study ways to explore the Demiurge’s informed search to develop programs with smaller sizes for a given output; although ambitious, it conceptually intersects with the works of Levin levin1973 ; li2013introduction , and on minimum message length Wallace2005 and minimum description length Gruenwald2007 .

## References

•  Atlan H.; Fessard A. L’organisation biologique et la théorie de l’information, volume 1351. Hermann Paris, (1972).
•  Ben-Naim A. A Farewell to Entropy: Statistical Thermodynamics Based on Information. World Scientific, (2008).
•  Brito P.; Fabiao F.; Staubyn A. Euler, Lambert, and the Lambert W-function today. Mathematical Scientist, vol. 33, (2008).
•  Levin L. A. Universal sequential search problems. Problemy Peredachi Informatsii, 9(3):115–116, 1973.
•  Borwein J. M. ; Lindstrom S. B. Meetings with Lambert W and other special functions in Optimization and Analysis. Pure and Applied Functional Analysis, 1(3):361–396, 2016.
•  Lavenda B. A new perspective on thermodynamics. Springer New York, (2010).
•  Mike Baez, John ; Stay. Algorithmic thermodynamics. Computability of the Physical, Mathematical Structures in Computer Science, 22:(2012),771–787, October (2010).
•  O’Brien C. The Demiurge in Ancient Thought: Secondary Gods and Divine Mediators. Cambridge University Press, (2015).
•  Wallace C. Statistical and Inductive Inference by Minimum Message Length. Springer-Verlag, (2005).
•  Corless R.; Gonnet G.; Hare D.; Jeffrey D. Lambert’s W function in maple. The Maple Technical Newsletter, vol. 9:12–22, (1993).
•  Corless R.; Gonnet G.; Hare D.; Jeffrey D.; Knuth D. On the Lambert W function. Advances in Computational mathematics, 5:329–359, (1996).
•  Deutsch D. Quantum theory, the church-turing principle and the universal quantum computer. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences, 400:97–117, (1985).
•  Downey R.; Hirschfeldt D. Algorithmic Randomness and Complexity. Springer Science & Business Media, (2010).
•  Bérut A.; Arakelyan A.; Petrosyan A.; Ciliberto S.; Dillenschneider R.; Lutz E. Experimental verification of Landauer’s principle linking information and thermodynamics. Nature, 483:187–189, (2012).
•  Halper E. One and Many in Aristotle’s Metaphysics, Books Alpha-Delta. Parmenides Pub., (2008).
•  Aristotle; Lawson-Tancred H. The Metaphysics. Classics Series. Penguin Books Limited, (1998).
•  Kondepudi D.; Prigogine I. Modern thermodynamics: from heat engines to dissipative structures. John Wiley & Sons, (2014).
•  Cover T.; Thomas J. Elements of information theory. John Wiley & Sons, (2012).
•  Stark H.; Woods J. Probability and Random Processes with Applications to Signal Processing. Prentice Hall, (2002).
•  Auer P. ; Herbster M. ; Warmuth M. K. et al.

Exponentially many local minima for single neurons.

Advances in Neural Information Processing Systems, (8):316 – 322, 1995.
•  Betti A. ; Gori M. The principle of least cognitive action. Theoretical Computer Science, 633:83 – 99, 2016. Biologically Inspired Processes in Neural Computation.
•  Grünwald P. The minimum description length principle. MIT press, (2007).
•  Grunwald P.; Vitányi P. Shannon information and Kolmogorov complexity. ArXiv Preprint cs/0410002, (2004).
•  Li M.; Vitányi P. An introduction to Kolmogorov complexity and its applications. Springer Science & Business Media, (2013).
•  Borwein J. M. ; Corless R. Emerging tools for experimental mathematics. The American mathematical monthly, vol. 106:pp. 889–909, (1999).
•  Deutsch D.; Ekert A.; Lupacchini R. Machines, logic and quantum physics. Bulletin of Symbolic Logic, vol. 6(03):pp. 265–283, (2000).
•  Gray R. Entropy and Information. Springer, (1990).
•  Solomonoff R. Algorithmic probability–its discovery–its properties and application to strong AI. Randomness Through Computation: Some Answers, More Questions, pages 149–157, (2011).
•  Solovay R. A version of Omega for which ZFC cannot predict a single bit. Springer, (2000).
•  Sonntag R.; Borgnakke C.; Van Wylen G.; Van Wyk S. Fundamentals of thermodynamics, volume 6. Wiley New York, (1998).
•  Yedidia A.; Aaronson S. A relatively small Turing machine whose behavior is independent of set theory. CoRR, (2016).
•  Ross W. Plato’s theory of ideas. Clarendon Press, (1951).
•  Zurek W. Algorithmic randomness and physical entropy. Physical Review A, 40:4731, (1989).