This page is the author's HTML rewrite of
Heiner Marxen, Jürgen Buntrock, Attacking the Busy Beaver 5, Bulletin of the EATCS, Number 40, February 1990, pp. 247-251, [ISSN 0252-9742]Since the original is not everywhere available, I have repeatedly found myself e-mailing the postscript version (ca 70KB) to people who were unable to locate a paper copy. This HTML document is intended to increase the availability of the text.
Differences between the original paper and this version are due to the restrictions of HTML or are just plain errors of mine. There are no intentional changes of content.
Chapter Table:
Since T. Rado in 1962 defined the busy beaver game several approaches have used computer technology to search busy beavers or even compute special values of Sigma. Sigma(5) is not yet known. A new approach to the computation of Sigma(5) is presented, together with preliminary results, especially Sigma(5)>=4098. This approach includes techniques to reduce the number of inspected Turing machines, to accelerate simulation of Turing machines and to decide nontermination of Turing machines.
The busy beaver game as defined by T. Rado in 1962 [Rad62] asks to construct simple Turing machines which produce a maximum number of ones on their tape before halting. These Turing machines have N states, one of which is the initial state, a tape alphabet with two symbols, named 0 and 1, an initial tape with all 0 symbols, an anonymous halt state, and with each step print a new symbol and move their head either left or right. For each N there is a finite number of such Turing machines. Sigma(N) is a function defined to be the maximum number of ones such a Turing machine with N states produces on its tape when halting. An N state Turing machine that does produce Sigma(N) ones is called a busy beaver.
Sigma has been proved to be not general recursive [Rad62], and hence noncomputable. Sigma(1)=1 is trivial, Sigma(2)=4 is easy to show, Sigma(3)=6 has been shown by [LiR65], Sigma(4)=13 has been shown by e.g. [Bra75] [WCF73]. Sigma(5) is not yet known. In [LSW83] Sigma(5)>=501 is given, and 1984 Uhing found Sigma(5)>=1915 [Dew85]. In August 1989 the authors found Sigma(5)>=4098. Green has given a non-trivial (not primitive recursive) lower bound for Sigma [Gre64].
While a lower bound of Sigma(N) for a certain N can be shown by a single Turing machine, computation of Sigma(N) itself requires to prove that all other N-state Turing machines do either not halt or produce not more ones. Obviously, the halting problem for Turing machines (which is noncomputable) is involved.
In order to use the above algorithm to compute Sigma(5) within practical time limits (say a month), three subgoals have to be achieved:
Even if instantaneous decision of each Turing machine were done, enumeration of all combinatorically possible ones were not practical. The numbers are already prohibitively large for N=5. Fortunately it is not very hard to reduce these numbers substantially.
If there is a set S of Turing machines such that either none of them halts, or all of them halt and produce the same number of ones, then - in order to compute Sigma - it is sufficient to decide/simulate just one machine out of S. If this set S can be ordered then there is a unique smallest element representing the set S. Such equivalence sets are the basic mechanism to reduce the amount of enumeration and computation.
The most important equivalence class has already been used by [Bra66], where its result is termed tree normal form (TNF). The normalization sceme used in [LiR65] is similar. Others [WCF73] [LSW83] have used TNF also. It identifies the set of machines that differ only in the naming of the states (isomorphism) and in transitions which never got used. All these machines obviously exhibit identical behaviour. Prior to simulation it is normally not known which transition will get used. Hence we arrive at the following way to enumerate all Turing machines by enumeration of single transitions during simulation:
The set of legal transition values is formed by an arbitrary combination of (N+1) target states, 2 symbols to write, and 2 directions to move. The set of meaningful transitions enumerated in step (6) is a subset of all legal ones by the following reduction rules:
This approximately enumerates the TNF. There are further equivalence classes of medium importance, e.g:
The basic acceleration technique is to use a macro machine. A K-macro-machine operates on blocks of K tape symbols (here bits) as one macro symbol. It has a duplicated set of states to code whether the left- or rightmost bit of the macro symbol is under the head. A K-macro-machine for an N-state Turing machine has 2*N*2K transitions, each of which is defined by running the original machine on a limited tape of length K.
The speed-up factor ranges between 1+eps and N*K*2K for some small eps (which depends on N and K). Thus, not much speed-up is guaranteed, but it can be significant. For small values of K (e.g. 6) the transition table of the macro machine can be implemented directly. Sparse table and caching techniques allow even K>=30 to be implemented. Note, that only those transitions need to be computed, which actually get used for simulation.
The next and most important acceleration technique is to use explicit tape symbol repetition counts, here termed exponents. E.g. ...abbaaab... is coded ...a¹b²a³b¹... The most obvious acceleration occurs when a transition like (x,a)->(x,b,R) happens to meet the left side of a heap of `a' symbols, which in one big step are converted to the same amount of `b' symbols. (If the target state is y!=x then one `a' is cut off the heap to get converted into one `b'.) Up to now, all 5-state busy beaver champions did perform such simple repetitions (for some small K) most of their time. As a rule of thumb, if a Turing machine executes many steps before halting, it does perform many simple iterations of this type. A very nice effect of this tape representation is that in nearly all ``interesting'' cases the tape is not longer than 7 cells. Longer tapes indicate nearly always non-termination or inappropriate K. Practical experience indicates that K should be chosen seperately and carefully for each Turing machine.
Worth noting is a class of Turing machines, ``counting machines'', which do not gain speed from exponents, as their basic behaviour on the tape is to enumerate (e.g. the binary representations of) successive natural numbers. Other techniques to accellerate especially counting machines are currently studied by the authors. Because both of the above techniques involve tape representation, they also influence other aspects, especially some non-termination decisions. Explication of iteration can be generalized, but it is not yet clear which generalization does pay off. Further research is necessary here.
Deciding that a Turing machine will never halt is always done by predicting the behaviour of the machine exactly enough, that it is sure that no not yet defined transition will ever be used, i.e. those that are already defined will be reused infinitely. This can be achieved by quite different arguments.
To (b): When in the process of enumeration a transition into the halting state is defined, it will immediately be used, the machine gets evaluated and is discarded. Thus, during normal simulation all defined transitions do not halt. Let D and U be the set of currently defined and not yet defined transitions. In order to halt, one transition u in U has to be needed and defined. That u has to be reached exclusively through transitions from D, i.e. by one out of the set P of all pathes of length L (L<=S+1) of the form DL-1×U, where S is the number of steps already done by the machine in question. Let Q be the set of all those p in P, that are possible according to two restrictions. First, the target state of each transition in p has to match the source state of the next transition in p. Second, for each transition t in p the tape context defined by the transitions in p before t must not contradict with the source symbol of t. If there is an L such that Q is empty, then all u are currently unreachable and the machine cannot halt any more. Such can be implemented by backward simulation. [WCF73] have used this restricted to L<=5.
To (a): If we find a pattern of future operation of which we can prove that it will be iterated infinitely, the machine will never halt. This is still a very general statement. Instantiations are:
Reproduction of the initial (all zero) tape but with another state than the start state is a special case. Here states can be renamed (isomorphism). Either the machine does not halt or it will be enumerated and evaluated in its isomorph form.
A general notion of ``greater configuration'' is hard to describe verbose, hence we use entry #8 of table 1 as a simple example.
# | Input Bit | Transition on State | Steps | Ones | Comment | |||||
A | B | C | D | E | F | |||||
1 | 0 | B1L | C1L | D1L | A1R | H1L | -- | 47,176,870 | 4098 | current BB(5), step champion |
1 | C1R | B1L | E0R | D1R | A0R | -- | ||||
2 | 0 | B1L | C1R | A1L | A1L | H1L | -- | 11,798,826 | 4098 | also BB(5) |
1 | A1L | B1R | D1R | E1R | C0R | -- | ||||
3 | 0 | B1L | C1R | A1L | C0R | C1L | -- | infinite | -- | symbol size 80 |
1 | B0R | E0L | D0R | A1R | H1L | -- | ||||
4 | 0 | B1L | C1R | D0R | A1L | H1L | -- | >2*109 | ? | ``chaotic'' |
1 | B1R | E0L | A0L | D0R | C0L | -- | ||||
5 | 0 | B1L | A0R | A0R | E0L | B0R | -- | infinity | -- | simple counter |
1 | A1R | C0L | D1L | B1R | H1L | -- | ||||
6 | 0 | B1L | A0R | C0R | E1L | B0L | -- | ? | ? | complex ``counter'' |
1 | A1R | C0L | D1L | A0R | H1L | -- | ||||
7 | 0 | B1L | C1R | F0R | A1L | A0L | E1L | 13,122,572,797 | 136,612 | example for many ones with 6 states |
1 | A1L | B1R | D1R | E0R | C1R | H1L | ||||
8 | 0 | B1L | C0R | H1L | -- | -- | -- | infinity | -- | example for greater configuration |
1 | A1R | B1L | A1R | -- | -- | -- |
After 1 step this machine reaches the configuration B:01, after 5 steps B:011, etc. More generally, from B:01n (n>=1) in 2n+2 steps it reaches B:01n+1. This process is essentially independent of n, and will be repeated infinitly. The 1-macro-machine with exponents in 5 macro steps transforms the configuration bR:011n (n>=2) into cL:1n, aL:111n-1, aL:1n01, bR:1n1 and then bR:011n+1, which is ``greater'', i.e. the state, all symbols and exponents are equal, except for one exponent, which became larger.
The notation sD (D in {L,R}) is used for that state of the macro machine which corresponds to the state s of the original machine and has the D-most bit of the macro symbol under its head.This happened in 5 macro steps, which all together are unable to handle original exponents>=5 differently. If such a transformation has happened for some exponent>=5 this (production of a greater configuration) is guaranteed to happen for all further exponents, as they are also>=5. The exponent can be considered to be ``not recognized'' by the machine.
Although partial independence of further operation from the tape (from one exponent in the example) is clearly a non-trivial property, it is very general and quite important. There are special cases which occur frequently and can be handled efficiently. A very simple special case has been used by [WCF73]. The method to prove partial independence can also be arbitrarily complex, i.e. this decision type may be extended as needed.
The authors have written two experimental programs, one in C (ca 8000 lines) and one in ML (a functional programming language) which from all machines (ca 88 million) currently leaves approximately 0.3% undecided. This can and will be improved substantially. Both programs discover the earlier champions, several 4096 and 4097 machines, and two 4098 machines. These two and some others are specified in table 1. Entry #7 demonstrates Sigma(6)>=136,612 and is the authers' current 6-state champion.
Considerable effort has been necessary to attack Sigma(5) and it is not yet totally sufficient. Also the amount of computation time is non-trivial (about ten days using a 33 MHz Clipper CPU). The various combinatoric upper bounds suggest that the computation of Sigma(6) will need around 500 times as many machines to be enumerated as the computation of Sigma(5), and of course 6-state machines are harder to decide. On the other hand, some thought and computer technology have made possible substantial progress since 1962. Also, computation of Sigma can be partitioned very easily and with a network of, say 2000, computers (workstations) Sigma(6) still appears to be attackable. Admittedly, this is currently not more than just the belief of the authors and contrary to the belief of others, e.g. of Allen H. Brady as quoted in [Dew85]. A more detailled paper about the computation of Sigma(5) is to come and might explain this belief a bit better.
[Bra66] | Brady, A.H., The conjectured highest scoring machines for Rado's Sigma(k) for the value k=4, IEEE Transactions on Electronic Computers, vol. EC-15, pp. 802-803, October 1966. |
[Bra75] | Brady, A.H., Solution of the non-computable ``Busy Beaver'' game for k=4, Abstracts for: ACM Computer Science Conference (Washington, DC, February 18-20, 1975), p. 27, ACM, 1975. |
[Dew85] | Dewdney, A.K., Computer Recreations, Scientific American, vol. 252, no. 4, pp. 12-16 esp. 16, April 1985. Translation: Computer-Kurzweil Spektrum der Wissenschaft, pp. 8-12 (esp.12), June 1985. |
[Gre64] | Milton W. Green, A lower bound on Rado's sigma function for binary Turing machines, Switching circuit theory and logical design, Proceedings of the Fifth Annual Symposium, Princton University, Princeton, N.J., November 11-13, 1964, The Institute of Electrical and Electronics Engineers, Inc., New York 1964, pp. 91-94. |
[LiR65] | Lin, S. and T. Rado, Computer Studies of Turing Machine Problems, Journal of the Association for Computing Machinery, vol. 12, no. 2, pp. 196-212, April 1965. |
[LSW83] | Jochen Ludewig, Uwe Schult, Frank Wankmüller, Chasing the Busy Beaver - Notes and Observations on a Competition to Find the 5-state Busy Beaver, Forschungsberichte des Fachbereichs Informatik, Nr. 159, Universität Dortmund, Dortmund, 1983. |
[Lyn72] | Lynn, D.S., New Results for Rado's Sigma Function for Binary Turing Machines, IEEE Transactions on Computers, vol. C-21, no. 8, pp. 894-896, August 1972. |
[Rad62] | Rado, T., On non-computable functions, The Bell System Technical Journal, vol. 41, no. 3, pp. 877-884, May 1962. |
[WCF73] | Weimann, B., K. Casper and W. Fenzl, Untersuchungen über haltende Programme für Turingmaschinen mit 2 Zeichen und bis zu 5 Befehlen, pp. 72-81, in: GI Gesellschaft für Informatik eV: 2. Jahrestagung (Karlsruhe, October 2-4, 1972), Lecture Notes in Economics and Mathematical Systems, vol. 78, Springer Verlag, Berlin, 1973. |
Back to the
busy beaver page
of Heiner Marxen.
Back to the home page of Heiner Marxen. |