Ackermann function explained

In computability theory, the Ackermann function, named after Wilhelm Ackermann, is one of the simplest and earliest-discovered examples of a total computable function that is not primitive recursive. All primitive recursive functions are total and computable, but the Ackermann function illustrates that not all total computable functions are primitive recursive.

After Ackermann's publication of his function (which had three non-negative integer arguments), many authors modified it to suit various purposes, so that today "the Ackermann function" may refer to any of numerous variants of the original function. One common version is the two-argument Ackermann–Péter function developed by Rózsa Péter and Raphael Robinson. Its value grows very rapidly; for example,

\operatorname{A}(4,2)

results in

265536-3

, an integer of 19,729 decimal digits.[1]

History

In the late 1920s, the mathematicians Gabriel Sudan and Wilhelm Ackermann, students of David Hilbert, were studying the foundations of computation. Both Sudan and Ackermann are credited with discovering total computable functions (termed simply "recursive" in some references) that are not primitive recursive. Sudan published the lesser-known Sudan function, then shortly afterwards and independently, in 1928, Ackermann published his function

\varphi

(from Greek, the letter phi). Ackermann's three-argument function,

\varphi(m,n,p)

, is defined such that for

p=0,1,2

, it reproduces the basic operations of addition, multiplication, and exponentiation as

\begin{align} \varphi(m,n,0)&=m+n\\ \varphi(m,n,1)&=m x n\\ \varphi(m,n,2)&=mn\end{align}

and for p > 2 it extends these basic operations in a way that can be compared to the hyperoperations:

\begin{align} \varphi(m,n,3)&=m[4](n+1)\\ \varphi(m,n,p)&\gtrapproxm[p+1](n+1)&&forp>3 \end{align}

(Aside from its historic role as a total-computable-but-not-primitive-recursive function, Ackermann's original function is seen to extend the basic arithmetic operations beyond exponentiation, although not as seamlessly as do variants of Ackermann's function that are specifically designed for that purpose—such as Goodstein's hyperoperation sequence.)

In On the Infinite, David Hilbert hypothesized that the Ackermann function was not primitive recursive, but it was Ackermann, Hilbert's personal secretary and former student, who actually proved the hypothesis in his paper On Hilbert's Construction of the Real Numbers.

Rózsa Péter and Raphael Robinson later developed a two-variable version of the Ackermann function that became preferred by almost all authors.

The generalized hyperoperation sequence, e.g.

G(m,a,b)=a[m]b

, is a version of the Ackermann function as well.

In 1963 R.C. Buck based an intuitive two-variable [2] variant

\operatorname{F}

on the hyperoperation sequence:

\operatorname{F}(m,n)=2[m]n.

Compared to most other versions, Buck's function has no unessential offsets:

\begin{align} \operatorname{F}(0,n)&=2[0]n=n+1\\ \operatorname{F}(1,n)&=2[1]n=2+n\\ \operatorname{F}(2,n)&=2[2]n=2 x n\\ \operatorname{F}(3,n)&=2[3]n=2n\\ \operatorname{F}(4,n)&=2[4]n=

{
2
{
.
.2
.
2
2
}} \\ &\quad\vdots\end

Many other versions of Ackermann function have been investigated.

Definition

Definition: as m-ary function

Ackermann's original three-argument function

\varphi(m,n,p)

is defined recursively as follows for nonnegative integers

m,n,

and

p

:

\begin{align} \varphi(m,n,0)&=m+n\\ \varphi(m,0,1)&=0\\ \varphi(m,0,2)&=1\\ \varphi(m,0,p)&=m&&forp>2\\ \varphi(m,n,p)&=\varphi(m,\varphi(m,n-1,p),p-1)&&forn,p>0 \end{align}

Of the various two-argument versions, the one developed by Péter and Robinson (called "the" Ackermann function by most authors) is defined for nonnegative integers

m

and

n

as follows:

\begin{array}{lcl} \operatorname{A}(0,n)&=&n+1\\ \operatorname{A}(m+1,0)&=&\operatorname{A}(m,1)\\ \operatorname{A}(m+1,n+1)&=&\operatorname{A}(m,\operatorname{A}(m+1,n)) \end{array}

The Ackermann function has also been expressed in relation to the hyperoperation sequence:

A(m,n)=\begin{cases} n+1&m=0\\ 2[m](n+3)-3&m>0\\ \end{cases}

or, written in Knuth's up-arrow notation (extended to integer indices

\geq-2

):

=\begin{cases} n+1&m=0\\ 2\uparrowm-2(n+3)-3&m>0\\ \end{cases}

or, equivalently, in terms of Buck's function F:

=\begin{cases} n+1&m=0\\ F(m,n+3)-3&m>0\\ \end{cases}

Definition: as iterated 1-ary function

Define

fn

as the n-th iterate of

f

:

\begin{array}{rll} f0(x)&=&x\\ fn+1(x)&=&f(fn(x)) \end{array}

Iteration is the process of composing a function with itself a certain number of times. Function composition is an associative operation, so

f(fn(x))=fn(f(x))

.

Conceiving the Ackermann function as a sequence of unary functions, one can set

\operatorname{A}m(n)=\operatorname{A}(m,n)

.

The function then becomes a sequence

\operatorname{A}0,\operatorname{A}1,\operatorname{A}2,...

of unary[3] functions, defined from iteration:

\begin{array}{lcl} \operatorname{A}0(n)&=&n+1\\ \operatorname{A}m+1(n)&=&

n+1
\operatorname{A}
m

(1)\\ \end{array}

Computation

The recursive definition of the Ackermann function can naturally be transposed to a term rewriting system (TRS).

TRS, based on 2-ary function

The definition of the 2-ary Ackermann function leads to the obvious reduction rules

\begin{array}{lll} (r1)&A(0,n)&&S(n)\\ (r2)&A(S(m),0)&&A(m,S(0))\\ (r3)&A(S(m),S(n))&&A(m,A(S(m),n)) \end{array}

Example

Compute

A(1,2)*4

The reduction sequence is [4]

Leftmost-outermost (one-step) strategyLeftmost-innermost (one-step) strategy

\underline{{A(S(0),S(S(0)))}}

\underline{{A(S(0),S(S(0)))}}

r3\underline{{A(0,A(S(0),S(0))}})

r3A(0,\underline{{A(S(0),S(0))}})

r1S(\underline{{A(S(0),S(0))}})

r3A(0,A(0,\underline{{A(S(0),0)}}))

r3S(\underline{{A(0,A(S0,0))}})

r2A(0,A(0,\underline{{A(0,S(0))}}))

r1S(S(\underline{{A(S(0),0)}}))

r1A(0,\underline{{A(0,S(S(0)))}})

r2S(S(\underline{{A(0,S(0))}}))

r1\underline{{A(0,S(S(S(0))))}}

r1S(S(S(S(0))))

r1S(S(S(S(0))))

To compute

\operatorname{A}(m,n)

one can use a stack, which initially contains the elements

\langlem,n\rangle

.

Then repeatedly the two top elements are replaced according to the rules[5]

\begin{array}{lllllllll} (r1)&0&,&n&&(n+1)\\ (r2)&(m+1)&,&0&&m&,&1\\ (r3)&(m+1)&,&(n+1)&&m&,&(m+1)&,&n \end{array}

Schematically, starting from

\langlem,n\rangle

:

WHILE stackLength <> 1

The pseudocode is published in .

For example, on input

\langle2,1\rangle

,
the stack configurationsreflect the reduction[6]

\underline{2,1}

\underline{A(2,1)}

1,\underline{2,0}

r1A(1,\underline{A(2,0)})

1,\underline{1,1}

r2A(1,\underline{A(1,1)})

1,0,\underline{1,0}

r3A(1,A(0,\underline{A(1,0)}))

1,0,\underline{0,1}

r2A(1,A(0,\underline{A(0,1)}))

1,\underline{0,2}

r1A(1,\underline{A(0,2)})

\underline{1,3}

r1\underline{A(1,3)}

0,\underline{1,2}

r3A(0,\underline{A(1,2)})

0,0,\underline{1,1}

r3A(0,A(0,\underline{A(1,1)}))

0,0,0,\underline{1,0}

r3A(0,A(0,A(0,\underline{A(1,0)})))

0,0,0,\underline{0,1}

r2A(0,A(0,A(0,\underline{A(0,1)})))

0,0,\underline{0,2}

r1A(0,A(0,\underline{A(0,2)}))

0,\underline{0,3}

r1A(0,\underline{A(0,3)})

\underline{0,4}

r1\underline{A(0,4)}

5

r15

Remarks

m,n

the computation of

A(m,n)

takes no more than

(A(m,n)+1)m

steps.

\operatorname{A}(m,n)

the maximum length of the stack is

\operatorname{A}(m,n)

, as long as

m>0

.

Their own algorithm, inherently iterative, computes

\operatorname{A}(m,n)

within

l{O}(m\operatorname{A}(m,n))

time and within

l{O}(m)

space.

TRS, based on iterated 1-ary function

The definition of the iterated 1-ary Ackermann functions leads to different reduction rules

\begin{array}{lll} (r4)&A(S(0),0,n)&&S(n)\\ (r5)&A(S(0),S(m),n)&&A(S(n),m,S(0))\\ (r6)&A(S(S(x)),m,n)&&A(S(0),m,A(S(x),m,n)) \end{array}

As function composition is associative, instead of rule r6 one can define

\begin{array}{lll} (r7)&A(S(S(x)),m,n)&&A(S(x),m,A(S(0),m,n)) \end{array}

Like in the previous section the computation of

1
\operatorname{A}
m(n)
can be implemented with a stack.

Initially the stack contains the three elements

\langle1,m,n\rangle

.

Then repeatedly the three top elements are replaced according to the rules[5]

\begin{array}{lllllllll} (r4)&1&,0&,n&&(n+1)\\ (r5)&1&,(m+1)&,n&&(n+1)&,m&,1\\ (r6)&(x+2)&,m&,n&&1&,m&,(x+1)&,m&,n\\ \end{array}

Schematically, starting from

\langle1,m,n\rangle

: WHILE stackLength <> 1

Example

On input

\langle1,2,1\rangle

the successive stack configurations are

\begin{align} &\underline{1,2,1} r5\underline{2,1,1}r61,1,\underline{1,1,1} r51,1,\underline{2,0,1} r61,1,1,0,\underline{1,0,1}\\ &r41,1,\underline{1,0,2} r4\underline{1,1,3} r5\underline{4,0,1} r61,0,\underline{3,0,1} r61,0,1,0,\underline{2,0,1}\\ &r61,0,1,0,1,0,\underline{1,0,1} r41,0,1,0,\underline{1,0,2} r41,0,\underline{1,0,3} r4\underline{1,0,4} r45 \end{align}

The corresponding equalities are

\begin{align} &A2(1) =

2
A
1(1)

=A1(A1(1)) =

2
A
0(1))

=A1(A0(A0(1)))\\ &=A1(A0(2)) =A1(3) =

4
A
0(1)

=

3
A
0(1))

=A0(A

2
0(1)))

\\ &=A0(A0(A0(A0(1)))) =A0(A0(A0(2))) =A0(A0(3)) =A0(4) =5 \end{align}

When reduction rule r7 is used instead of rule r6, the replacements in the stack will follow

\begin{array}{lllllllll} (r7)&(x+2)&,m&,n&&(x+1)&,m&,1&,m&,n \end{array}

The successive stack configurations will then be

\begin{align} &\underline{1,2,1} r5\underline{2,1,1}r71,1,\underline{1,1,1} r51,1,\underline{2,0,1} r71,1,1,0,\underline{1,0,1}\\ &r41,1,\underline{1,0,2} r4\underline{1,1,3} r5\underline{4,0,1} r73,0,\underline{1,0,1} r4\underline{3,0,2}\\ &r72,0,\underline{1,0,2} r4\underline{2,0,3} r71,0,\underline{1,0,3} r4\underline{1,0,4} r45 \end{align}

The corresponding equalities are

\begin{align} &A2(1) =

2
A
1(1)

=A1(A1(1)) =

2
A
0(1))

=A1(A0(A0(1)))\\ &=A1(A0(2))=A1(3)=

4
A
0(1)

=

3
A
0(A

0(1)) =

3
A
0(2)

\\ &=

2
A
0(A

0(2)) =

2
A
0(3)

=A0(A0(3)) =A0(4)=5 \end{align}

Remarks

A(2,1)

converges in 14 steps: 6 × r1, 3 × r2, 5 × r3. The reduction of

A2(1)

converges in the same 14 steps: 6 × r4, 3 × r5, 5 × r6/r7. The TRSs differ in the order in which the reduction rules are applied.

Ai(n)

is computed following the rules, the maximum length of the stack stays below

2 x A(i,n)

. When reduction rule r7 is used instead of rule r6, the maximum length of the stack is only

2(i+2)

. The length of the stack reflects the recursion depth. As the reduction according to the rules involves a smaller maximum depth of recursion,[7] this computation is more efficient in that respect.

TRS, based on hyperoperators

As - or - showed explicitly, the Ackermann function can be expressed in terms of the hyperoperation sequence:

A(m,n)=\begin{cases} n+1&m=0\\ 2[m](n+3)-3&m>0\\ \end{cases}

or, after removal of the constant 2 from the parameter list, in terms of Buck's function

=\begin{cases} n+1&m=0\\ F(m,n+3)-3&m>0\\ \end{cases}

Buck's function

\operatorname{F}(m,n)=2[m]n

, a variant of Ackermann function by itself, can be computed with the following reduction rules:

\begin{array}{lll} (b1)&F(S(0),0,n)&&S(n)\\ (b2)&F(S(0),S(0),0)&&S(S(0))\\ (b3)&F(S(0),S(S(0)),0)&&0\\ (b4)&F(S(0),S(S(S(m))),0)&&S(0)\\ (b5)&F(S(0),S(m),S(n))&&F(S(n),m,F(S(0),S(m),0))\\ (b6)&F(S(S(x)),m,n)&&F(S(0),m,F(S(x),m,n)) \end{array}

Instead of rule b6 one can define the rule

\begin{array}{lll} (b7)&F(S(S(x)),m,n)&&F(S(x),m,F(S(0),m,n)) \end{array}

To compute the Ackermann function it suffices to add three reduction rules

\begin{array}{lll} (r8)&A(0,n) &&S(n)\\ (r9)&A(S(m),n)&&P(F(S(0),S(m),S(S(S(n)))))\\ (r10)&P(S(S(S(m))))&&m\\ \end{array}

These rules take care of the base case A(0,n), the alignment (n+3) and the fudge (-3).

Example

Compute

A(2,1)*5

using reduction rule

b7

:
using reduction rule

b6

:

\underline{A(2,1)}

\underline{A(2,1)}

r9P(\underline{F(1,2,4)})

r9P(\underline{F(1,2,4)})

b5P(F(4,1,\underline{F(1,2,0)}))

b5P(F(4,1,\underline{F(1,2,0)}))

b3P(\underline{F(4,1,0)})

b3P(\underline{F(4,1,0)})

b7P(F(3,1,\underline{F(1,1,0)}))

b6P(F(1,1,\underline{F(3,1,0)}))

b2P(\underline{F(3,1,2)})

b6P(F(1,1,F(1,1,\underline{F(2,1,0)})))

b7P(F(2,1,\underline{F(1,1,2)}))

b6P(F(1,1,F(1,1,F(1,1,\underline{F(1,1,0)}))))

b5P(F(2,1,F(2,0,\underline{F(1,1,0)})))

b2P(F(1,1,F(1,1,\underline{F(1,1,2)})))

b2P(F(2,1,\underline{F(2,0,2)}))

b5P(F(1,1,F(1,1,F(2,0,\underline{F(1,1,0)}))))

b7P(F(2,1,F(1,0,\underline{F(1,0,2)})))

b2P(F(1,1,F(1,1,\underline{F(2,0,2)})))

b1P(F(2,1,\underline{F(1,0,3)}))

b6P(F(1,1,F(1,1,F(1,0,\underline{F(1,0,2)}))))

b1P(\underline{F(2,1,4)})

b1P(F(1,1,F(1,1,\underline{F(1,0,3)})))

b7P(F(1,1,\underline{F(1,1,4)}))

b1P(F(1,1,\underline{F(1,1,4)}))

b5P(F(1,1,F(4,0,\underline{F(1,1,0)})))

b5P(F(1,1,F(4,0,\underline{F(1,1,0)})))

b2P(F(1,1,\underline{F(4,0,2)}))

b2P(F(1,1,\underline{F(4,0,2)}))

b7P(F(1,1,F(3,0,\underline{F(1,0,2)})))

b6P(F(1,1,F(1,0,\underline{F(3,0,2)})))

b1P(F(1,1,\underline{F(3,0,3)}))

b6P(F(1,1,F(1,0,F(1,0,\underline{F(2,0,2)}))))

b7P(F(1,1,F(2,0,\underline{F(1,0,3)})))

b6P(F(1,1,F(1,0,F(1,0,F(1,0,\underline{F(1,0,2)})))))

b1P(F(1,1,\underline{F(2,0,4)}))

b1P(F(1,1,F(1,0,F(1,0,\underline{F(1,0,3)}))))

b7P(F(1,1,F(1,0,\underline{F(1,0,4)})))

b1P(F(1,1,F(1,0,\underline{F(1,0,4)})))

b1P(F(1,1,\underline{F(1,0,5)}))

b1P(F(1,1,\underline{F(1,0,5)}))

b1P(\underline{F(1,1,6)})

b1P(\underline{F(1,1,6)})

b5P(F(6,0,\underline{F(1,1,0)}))

b5P(F(6,0,\underline{F(1,1,0)}))

b2P(\underline{F(6,0,2)})

b2P(\underline{F(6,0,2)})

b7P(F(5,0,\underline{F(1,0,2)}))

b6P(F(1,0,\underline{F(5,0,2)}))

b1P(\underline{F(5,0,3)})

b6P(F(1,0,F(1,0,\underline{F(4,0,2)})))

b7P(F(4,0,\underline{F(1,0,3)}))

b6P(F(1,0,F(1,0,F(1,0,\underline{F(3,0,2)}))))

b1P(\underline{F(4,0,4)})

b6P(F(1,0,F(1,0,F(1,0,F(1,0,\underline{F(2,0,2)})))))

b7P(F(3,0,\underline{F(1,0,4)}))

b6P(F(1,0,F(1,0,F(1,0,F(1,0,F(1,0,\underline{F(1,0,2)}))))))

b1P(\underline{F(3,0,5)})

b1P(F(1,0,F(1,0,F(1,0,F(1,0,\underline{F(1,0,3)})))))

b7P(F(2,0,\underline{F(1,0,5)}))

b1P(F(1,0,F(1,0,F(1,0,\underline{F(1,0,4)}))))

b1P(\underline{F(2,0,6)})

b1P(F(1,0,F(1,0,\underline{F(1,0,5)})))

b7P(F(1,0,\underline{F(1,0,6)}))

b1P(F(1,0,\underline{F(1,0,6)}))

b1P(\underline{F(1,0,7)})

b1P(\underline{F(1,0,7)})

b1\underline{P(8)}

b1\underline{P(8)}

r105

r105

The matching equalities are

b6

is applied:

\begin{align} &A(2,1)+3 =F(2,4) =... =F6(0,2) =F(0,F5(0,2)) =F(0,F(0,F4(0,2)))\\ &=F(0,F(0,F(0,F3(0,2)))) =F(0,F(0,F(0,F(0,F2(0,2))))) =F(0,F(0,F(0,F(0,F(0,F(0,2))))))\\ &=F(0,F(0,F(0,F(0,F(0,3))))) =F(0,F(0,F(0,F(0,4)))) =F(0,F(0,F(0,5))) =F(0,F(0,6)) =F(0,7) =8 \end{align}

b7

is applied:

\begin{align} &A(2,1)+3 =F(2,4) =... =F6(0,2) =F5(0,F(0,2)) =F5(0,3) =F4(0,F(0,3)) =F4(0,4)\\ &=F3(0,F(0,4)) =F3(0,5) =F2(0,F(0,5)) =F2(0,6) =F(0,F(0,6)) =F(0,7) =8 \end{align}

Remarks

\operatorname{A}i(n)

according to the rules is deeply recursive. The maximum depth of nested

F

s is

A(i,n)+1

. The culprit is the order in which iteration is executed:

Fn+1(x)=F(Fn(x))

. The first

F

disappears only after the whole sequence is unfolded.

Fn+1(x)=Fn(F(x))

simulates the repeated loop over a block of code.[8] The nesting is limited to

(i+1)

, one recursion level per iterated function. showed this correspondence.

A(2,1)

for instance converges in 35 steps: 12 × b1, 4 × b2, 1 × b3, 4 × b5, 12 × b6/b7, 1 × r9, 1 × r10. The modus iterandi only affects the order in which the reduction rules are applied.

A(i,n)

within

l{O}(iA(i,n))

time and within

l{O}(i)

space.

Huge numbers

To demonstrate how the computation of

A(4,3)

results in many steps and in a large number:[6]

\begin{align} A(4,3)&A(3,A(4,2))\\ &A(3,A(3,A(4,1)))\\ &A(3,A(3,A(3,A(4,0))))\\ &A(3,A(3,A(3,A(3,1))))\\ &A(3,A(3,A(3,A(2,A(3,0)))))\\ &A(3,A(3,A(3,A(2,A(2,1)))))\\ &A(3,A(3,A(3,A(2,A(1,A(2,0))))))\\ &A(3,A(3,A(3,A(2,A(1,A(1,1))))))\\ &A(3,A(3,A(3,A(2,A(1,A(0,A(1,0)))))))\\ &A(3,A(3,A(3,A(2,A(1,A(0,A(0,1)))))))\\ &A(3,A(3,A(3,A(2,A(1,A(0,2))))))\\ &A(3,A(3,A(3,A(2,A(1,3)))))\\ &A(3,A(3,A(3,A(2,A(0,A(1,2))))))\\ &A(3,A(3,A(3,A(2,A(0,A(0,A(1,1)))))))\\ &A(3,A(3,A(3,A(2,A(0,A(0,A(0,A(1,0))))))))\\ &A(3,A(3,A(3,A(2,A(0,A(0,A(0,A(0,1))))))))\\ &A(3,A(3,A(3,A(2,A(0,A(0,A(0,2)))))))\\ &A(3,A(3,A(3,A(2,A(0,A(0,3))))))\\ &A(3,A(3,A(3,A(2,A(0,4)))))\\ &A(3,A(3,A(3,A(2,5))))\\ &    \vdots\\ &A(3,A(3,A(3,13)))\\ &    \vdots\\ &A(3,A(3,65533))\\ &    \vdots\\ &A(3,265536-3)\\ &    \vdots\\ &

265536
2

-3.\\ \end{align}

Table of values

Computing the Ackermann function can be restated in terms of an infinite table. First, place the natural numbers along the top row. To determine a number in the table, take the number immediately to the left. Then use that number to look up the required number in the column given by that number and one row up. If there is no number to its left, simply look at the column headed "1" in the previous row. Here is a small upper-left portion of the table:

Values of A(mn)
01234n
01 2 3 4 5

n+1

12 3 4 5 6

n+2=2+(n+3)-3

23 5 7 9 11

2n+3=2 ⋅ (n+3)-3

35 13 29 61 125

2(n-3

41365533265536 − 3
265536
{2
} - 3
265536
2
{2
} - 3

\begin{matrix}\underbrace{{22}{{{

2}}}}
n+3

-3\end{matrix}

22
={2
}-3

=2\uparrow\uparrow3-3

22
2
={2
}-3

=2\uparrow\uparrow4-3

22
2
2
={2
}-3

=2\uparrow\uparrow5-3

22
2
2
2
={2
}-3

=2\uparrow\uparrow6-3

22
2
2
2
2
={2
}-3

=2\uparrow\uparrow7-3

=2\uparrow\uparrow(n+3)-3

565533

=2\uparrow\uparrow(2\uparrow\uparrow2)-3


=2\uparrow\uparrow\uparrow3-3

2\uparrow\uparrow\uparrow4-3

2\uparrow\uparrow\uparrow5-3

2\uparrow\uparrow\uparrow6-3

2\uparrow\uparrow\uparrow7-3

2\uparrow\uparrow\uparrow(n+3)-3

6

2\uparrow\uparrow\uparrow\uparrow3-3

2\uparrow\uparrow\uparrow\uparrow4-3

2\uparrow\uparrow\uparrow\uparrow5-3

2\uparrow\uparrow\uparrow\uparrow6-3

2\uparrow\uparrow\uparrow\uparrow7-3

2\uparrow\uparrow\uparrow\uparrow(n+3)-3

m

(2\to3\to(m-2))-3

(2\to4\to(m-2))-3

(2\to5\to(m-2))-3

(2\to6\to(m-2))-3

(2\to7\to(m-2))-3

(2\to(n+3)\to(m-2))-3

The numbers here which are only expressed with recursive exponentiation or Knuth arrows are very large and would take up too much space to notate in plain decimal digits.

Despite the large values occurring in this early section of the table, some even larger numbers have been defined, such as Graham's number, which cannot be written with any small number of Knuth arrows. This number is constructed with a technique similar to applying the Ackermann function to itself recursively.

This is a repeat of the above table, but with the values replaced by the relevant expression from the function definition to show the pattern clearly:

Values of A(mn)
01234n
00+1 1+1 2+1 3+1 4+1 n + 1
1A(0, 1) A(0, A(1, 0))
= A(0, 2)
A(0, A(1, 1))
= A(0, 3)
A(0, A(1, 2))
= A(0, 4)
A(0, A(1, 3))
= A(0, 5)
A(0, A(1, n−1))
2A(1, 1) A(1, A(2, 0))
= A(1, 3)
A(1, A(2, 1))
= A(1, 5)
A(1, A(2, 2))
= A(1, 7)
A(1, A(2, 3))
= A(1, 9)
A(1, A(2, n−1))
3A(2, 1) A(2, A(3, 0))
= A(2, 5)
A(2, A(3, 1))
= A(2, 13)
A(2, A(3, 2))
= A(2, 29)
A(2, A(3, 3))
= A(2, 61)
A(2, A(3, n−1))
4A(3, 1) A(3, A(4, 0))
= A(3, 13)
A(3, A(4, 1))
= A(3, 65533)
A(3, A(4, 2)) A(3, A(4, 3)) A(3, A(4, n−1))
5A(4, 1) A(4, A(5, 0)) A(4, A(5, 1)) A(4, A(5, 2)) A(4, A(5, 3)) A(4, A(5, n−1))
6A(5, 1) A(5, A(6, 0)) A(5, A(6, 1)) A(5, A(6, 2)) A(5, A(6, 3)) A(5, A(6, n−1))

Properties

General remarks

A(m,n)

always terminates. However, the recursion is bounded because in each recursive application either

m

decreases, or

m

remains the same and

n

decreases. Each time that

n

reaches zero,

m

decreases, so

m

eventually reaches zero as well. (Expressed more technically, in each case the pair

(m,n)

decreases in the lexicographic order on pairs, which is a well-ordering, just like the ordering of single non-negative integers; this means one cannot go down in the ordering infinitely many times in succession.) However, when

m

decreases there is no upper bound on how much

n

can increase — and it will often increase greatly.

m\geq4

, however, it grows much more quickly; even

A(4,2)

is about 2.00353, and the decimal expansion of

A(4,3)

is very large by any typical measure, about 2.12004.

f(n)=A(n,n)

that increases both

m

and

n

at the same time dwarfs every primitive recursive function, including very fast-growing functions such as the exponential function, the factorial function, multi- and superfactorial functions, and even functions defined using Knuth's up-arrow notation (except when the indexed up-arrow is used). It can be seen that

f(n)

is roughly comparable to

f\omega(n)

in the fast-growing hierarchy. This extreme growth can be exploited to show that

f

which is obviously computable on a machine with infinite memory such as a Turing machine and so is a computable function, grows faster than any primitive recursive function and is therefore not primitive recursive.

Not primitive recursive

The Ackermann function grows faster than any primitive recursive function and therefore is not itself primitive recursive. The sketch of the proof is this: a primitive recursive function defined using up to k recursions must grow slower than

fk+1(n)

, the (k+1)-th function in the fast-growing hierarchy, but the Ackermann function grows at least as fast as

f\omega(n)

.

Specifically, one shows that for every primitive recursive function

f(x1,\ldots,xn)

there exists a non-negative integer

t

such that for all non-negative integers

x1,\ldots,xn

,

f(x1,\ldots,xn)<A(t,maxixi).

Once this is established, it follows that

A

itself is not primitive recursive, since otherwise putting

x1=x2=t

would lead to the contradiction

A(t,t)<A(t,t).

The proof proceeds as follows: define the class

l{A}

of all functions that grow slower than the Ackermann function

l{A}=\left\{f|\existst\forallx1 … \forallxn:f(x1,\ldots,xn)<A(t,maxixi)\right\}

and show that

l{A}

contains all primitive recursive functions. The latter is achieved by showing that

l{A}

contains the constant functions, the successor function, the projection functions and that it is closed under the operations of function composition and primitive recursion.

Use in computational complexity

The Ackermann function appears in the time complexity of some algorithms, such as vector addition systems and Petri net reachability, thus showing they are computationally infeasible for large instances. The inverse of the Ackerman function appears in some time complexity results.

Inverse

Since the function considered above grows very rapidly, its inverse function, f, grows very slowly. This inverse Ackermann function f−1 is usually denoted by α. In fact, α(n) is less than 5 for any practical input size n, since is on the order of

216
2
2
2
.

This inverse appears in the time complexity of some algorithms, such as the disjoint-set data structure and Chazelle's algorithm for minimum spanning trees. Sometimes Ackermann's original function or other variations are used in these settings, but they all grow at similarly high rates. In particular, some modified functions simplify the expression by eliminating the −3 and similar terms.

A two-parameter variation of the inverse Ackermann function can be defined as follows, where

\lfloorx\rfloor

is the floor function:

\alpha(m,n)=min\{i\geq1:A(i,\lfloorm/n\rfloor)\geqlog2n\}.

This function arises in more precise analyses of the algorithms mentioned above, and gives a more refined time bound. In the disjoint-set data structure, m represents the number of operations while n represents the number of elements; in the minimum spanning tree algorithm, m represents the number of edges while n represents the number of vertices. Several slightly different definitions of exist; for example, is sometimes replaced by n, and the floor function is sometimes replaced by a ceiling.

Other studies might define an inverse function of one where m is set to a constant, such that the inverse applies to a particular row.

The inverse of the Ackermann function is primitive recursive.

Use as benchmark

The Ackermann function, due to its definition in terms of extremely deep recursion, can be used as a benchmark of a compiler's ability to optimize recursion. The first published use of Ackermann's function in this way was in 1970 by Dragoș Vaida and, almost simultaneously, in 1971, by Yngve Sundblad.

Sundblad's seminal paper was taken up by Brian Wichmann (co-author of the Whetstone benchmark) in a trilogy of papers written between 1975 and 1982.

See also

Bibliography

External links

Notes and References

  1. Web site: Decimal expansion of A(4,2). https://web.archive.org/web/20100120134707/http://kosara.net/thoughts/ackermann42.html . August 27, 2000. January 20, 2010. kosara.net .
  2. with parameter order reversed
  3. 'curried'
  4. In each step the underlined redex is rewritten.
  5. here: leftmost-innermost strategy!
  6. For better readability
    S(0) is notated as 1,
    S(S(0)) is notated as 2,
    S(S(S(0))) is notated as 3,
    etc...
  7. The maximum depth of recursion refers to the number of levels of activation of a procedure which exist during the deepest call of the procedure.
  8. LOOP n+1 TIMES DO F