Showing posts with label o3. Show all posts
Showing posts with label o3. Show all posts

Thursday, August 7, 2025

Viterbi semiring intro

Explain the Viterbi semiring

The Viterbi semiring is the algebraic structure underlying the Viterbi algorithm’s “max-product” computations — it formalizes how you score and select the single best path (most probable sequence) in models like Hidden Markov Models (HMMs) or weighted finite-state automata.

Core idea

A semiring is a set $S$ equipped with two binary operations:

  • $\oplus$ (an “addition”-like operation, here used to choose between alternatives),
  • $\otimes$ (a “multiplication”-like operation, here used to accumulate scores along a path),

along with identity elements $\mathbf{0}$ for $\oplus$ and $\mathbf{1}$ for $\otimes$, such that:

  • $\oplus$ is associative and commutative, with identity $\mathbf{0}$,
  • $\otimes$ is associative, with identity $\mathbf{1}$,
  • $\otimes$ distributes over $\oplus$: $a \otimes (b \oplus c) = (a \otimes b) \oplus (a \otimes c)$,
  • $\mathbf{0}$ is absorbing for $\otimes$: $\mathbf{0} \otimes a = \mathbf{0}$.

The Viterbi semiring for probabilities is typically:

  • Domain: $[0,1]$ (or, for numerical stability, log-space: $\mathbb{R} \cup \{-\infty\}$),
  • $\oplus = \max$ (choose the most probable alternative),
  • $\otimes = \times$ (multiply probabilities along a path),
  • Identities: $\mathbf{0} = 0$ (since $\max(x,0) = x$ for $x \in [0,1]$), $\mathbf{1} = 1$.

In log-space, this becomes the max-plus semiring:

  • Domain: $\mathbb{R} \cup \{-\infty\}$,
  • $\oplus = \max$,
  • $\otimes = +$,
  • Identities: $\mathbf{0} = -\infty$, $\mathbf{1} = 0$.

Switching to log-space turns products into sums (safer numerically) and keeps the “best path” selection as a max.

Connection to the Viterbi algorithm

The Viterbi algorithm performs dynamic programming over this semiring: at each time step $t$, for each state $j$, it computes

$$ \delta_t(j) = \bigoplus_{i} \left[ \delta_{t-1}(i) \otimes a_{i,j} \right] \otimes b_j(o_t) $$

which, in the usual (probability) notation, is

$$ \delta_t(j) = \max_i \left( \delta_{t-1}(i) \cdot a_{i,j} \right) \cdot b_j(o_t), $$

where:

  • $\delta_t(j)$ is the max probability of any path ending in state $j$ after observing $o_1, \dots, o_t$,
  • $a_{i,j}$ is the transition probability from state $i$ to $j$,
  • $b_j(o_t)$ is the emission probability of observation $o_t$ from state $j$.

In log-space:

$$ \log \delta_t(j) = \max_i \left( \log \delta_{t-1}(i) + \log a_{i,j} \right) + \log b_j(o_t). $$

Backpointers record which predecessor $i$ achieved the $\max$, so the single best full path can be reconstructed.

Small concrete example

HMM with two states $A, B$:

  • Initial probs: $\pi_A = 0.6,\ \pi_B = 0.4$

  • Transitions: $A \to A = 0.7,\ A \to B=0.3;\ B\to A=0.4,\ B\to B=0.6$

  • Emissions for observation sequence $[x, y]$:

    • From $A$: $P(x)=0.5,\ P(y)=0.5$
    • From $B$: $P(x)=0.1,\ P(y)=0.9$

Step 1 (observe $x$):

$$ \delta_1(A)=0.6 \times 0.5=0.3,\quad \delta_1(B)=0.4 \times 0.1=0.04. $$

Step 2 (observe $y$):

$$ \delta_2(A)=\max(0.3 \times 0.7,\ 0.04 \times 0.4) \times 0.5 = \max(0.21,\ 0.016)\times 0.5 = 0.105,\\ \delta_2(B)=\max(0.3 \times 0.3,\ 0.04 \times 0.6) \times 0.9 = \max(0.09,\ 0.024)\times 0.9 = 0.081. $$

Final best state is $A$ with probability $0.105$; backpointers give path $A \to A$.

Contrast: sum-product semiring

The sum-product semiring (used for computing total probability or marginals) has:

  • $\oplus = +$,
  • $\otimes = \times$,
  • Identities: $\mathbf{0} = 0,\ \mathbf{1}=1$.

There, you sum over paths instead of taking the max, so you’re aggregating total mass rather than picking one best path. In log-space that requires log-sum-exp for $\oplus$, which is more expensive than $\max$.

Why thinking in semirings helps

Many dynamic programming algorithms (Viterbi, shortest path, parsing, belief propagation variants) can be seen as instances of the generalized semiring framework: replace $\oplus$ and $\otimes$ to get different behaviors (e.g., highest weight path vs. total weight, counting paths, etc.). The Viterbi semiring specializes this to “best path under multiplicative scoring.”

Properties summary

  • Associativity / commutativity: $\max$ is commutative/associative; multiplication (or addition in log-space) is associative.
  • Distributivity: $a \otimes \max(b,c) = \max(a \otimes b,\ a \otimes c)$ holds.
  • No additive inverse: It’s a semiring, not a ring — there is no operation to “undo” a $\max$.
  • Used for decoding: In speech recognition, bioinformatics, NLP (e.g., Viterbi taggers, parse scoring), etc.

If you want, I can also show how the Viterbi semiring fits into a generic semiring-based code template or how to generalize it to other semirings. Would you like that?

Examples of theory development according to Halmos

Paul Halmos said:

It has often happened that a theory designed originally as a tool for the study of a physical problem came subsequently to have purely mathematical interest. When that happens, the theory is usually generalized way beyond the point needed for applications, the generalizations make contact with other theories (frequently in completely unexpected directions), and the subject becomes established as a new part of pure mathematics. The part of pure mathematics so created does not (and need not) pretend to solve the physical problem from which it arises; it must stand or fall on its own merits.

Give examples of this.

Below are some well-loved cases where a tool built for a concrete physical problem was abstracted, stretched, and woven so deeply into mainstream mathematics that it now flourishes with little—or no—regard for the original application.


1. Calculus ⇒ Real & Complex Analysis, Measure Theory

Physics seed. Newton and Leibniz invented the differential and integral calculus to describe planetary motion and falling bodies. Mathematical flowering. Over the next three centuries questions about rigor, convergence, and “what is a function?” spawned ε-δ analysis, measure theory, Lebesgue integration, and modern functional analysis. Today vast stretches of real and complex analysis have no direct tie to mechanics, yet the language of limits, continuity, and integration they introduced underpins almost every branch of pure mathematics.


2. Fourier’s Heat Equation ⇒ Harmonic Analysis & Representation Theory

Physics seed. In 1807 Fourier decomposed temperature distributions into sine waves to solve the heat equation. Mathematical flowering. Generalizing those trigonometric series to arbitrary groups, spaces, and operators led to harmonic analysis, abstract Plancherel theorems, and deep links to group representation theory and number theory (e.g., modular forms, automorphic representations). The toolbox now serves problems that have nothing to do with heat flow.


3. Hilbert Space & Operators ⇒ Modern Functional Analysis and Operator Algebras

Physics seed. Integral-equation formulations of diffraction and quantum mechanics in the early 1900s forced mathematicians (notably Hilbert) to treat infinite-dimensional inner-product spaces systematically. Mathematical flowering. Banach’s and von Neumann’s generalizations (Banach spaces, C*- and von Neumann algebras, spectral theory) turned functional analysis into its own kingdom, fundamental to fields ranging from PDE to ergodic theory and pure operator algebra classification, far removed from Schrödinger’s equation.


4. Dirac Delta ⇒ Distribution Theory

Physics seed. Dirac introduced the “δ-function’’ to describe point charges and quantum measurements—an object that made physical sense but defied classical function definitions. Mathematical flowering. Schwartz formalized distributions (generalized functions) in the 1940s, creating a robust framework for linear PDEs, microlocal analysis, and the modern theory of Sobolev spaces. Many distribution-theoretic developments concern abstract regularity and propagation of singularities, with no physical context required.


5. Hamiltonian Mechanics ⇒ Symplectic Geometry & Topology

Physics seed. Hamilton packaged classical mechanics in the 1830s using conjugate position–momentum coordinates. Mathematical flowering. Treating the 2n-dimensional phase space abstractly gave rise to symplectic manifolds. Gromov’s 1985 pseudoholomorphic-curve theory, Floer homology, and mirror symmetry connected symplectic geometry to topology, algebraic geometry, and category theory—fields where “mass” and “momentum” never appear.


6. Kelvin’s Vortex Atoms ⇒ Knot Theory & Low-Dimensional Topology

Physics seed. Lord Kelvin (1867) imagined atoms as knotted vortices in the ether, motivating Tait to tabulate knots. Mathematical flowering. Though the ether died, the knot tables survived. Reidemeister moves, Alexander, Jones, and HOMFLY-PT polynomials, plus 3-manifold invariants such as Chern–Simons–Witten theory now occupy a central place in topology, representation theory, and even quantum computing.


7. Yang–Mills Gauge Fields ⇒ 4-Manifold Topology & Geometric Analysis

Physics seed. 1950s non-abelian gauge theory described the strong and weak nuclear forces. Mathematical flowering. Donaldson (1983) used the Yang–Mills moduli space to produce exotic smooth structures on ℝ⁴; Seiberg–Witten theory refined these techniques. The resulting revolution in differential topology and low-dimensional geometry persists regardless of particle physics.


8. Random Matrix Theory (Wigner’s Nuclear Physics) ⇒ Number Theory & Combinatorics

Physics seed. Wigner modeled heavy-nucleus energy levels with random symmetric matrices in the 1950s. Mathematical flowering. The statistics of eigenvalues (level spacing, Tracy–Widom laws) were abstracted and now illuminate the zeros of the Riemann zeta function, growth of Young diagrams, and universality questions in combinatorics—no neutron spectra in sight.


9. Statistical Mechanics ⇒ Ergodic Theory & Dynamical Systems

Physics seed. Boltzmann and Gibbs created ensembles to explain gas thermodynamics. Mathematical flowering. Abstract notions of measure-preserving transformations, entropy, and mixing evolved into ergodic theory. Today, rigidity theorems for group actions or homogeneous flows live squarely in pure mathematics, even when the systems studied have no atoms at all.


10. Quantum Integrable Models ⇒ Quantum Groups & Knot Invariants

Physics seed. Exactly solvable 1-D quantum spin chains used R-matrices satisfying the Yang–Baxter equation. Mathematical flowering. Drinfeld and Jimbo abstracted that combinatorial property into “quantum groups,” which now influence category theory, low-dimensional topology, and representation theory—the physical spins have faded from view.


Halmos’s cycle—applied tool → wild generalization → unexpected bridges → autonomous theory—recurs throughout mathematics. The stories above show how questions born in the laboratory or observatory can end up enriching the pure landscape in ways their inventors could never have predicted.

Wednesday, August 6, 2025

Vector space from field

Show that if $\mathbb{F}_q$ is a field with $q$ elements, then $\mathbb{F}_q^n$ is a vector space of dimension $n$ over $\mathbb{F}_q$.

Why $\mathbb{F}_q^n$ is a vector space over $\mathbb{F}_q$ Take the set of all $n$-tuples of elements of $\mathbb{F}_q$:

$$ \mathbb{F}_q^{\,n}=\{(a_1,\dots,a_n)\mid a_i\in\mathbb{F}_q\}. $$

Define the usual component-wise operations

  • Addition: $(a_1,\dots,a_n)+(b_1,\dots,b_n)=(a_1+b_1,\dots,a_n+b_n)$.
  • Scalar multiplication: for $\lambda\in\mathbb{F}_q$, $\lambda\,(a_1,\dots,a_n)=(\lambda a_1,\dots,\lambda a_n)$.

Because $\mathbb{F}_q$ is already a field, its addition “$+$” and multiplication “$\cdot$” satisfy all field axioms. Applying them component-wise:

  • Closure, associativity, commutativity, additive identity $0=(0,\dots,0)$, and additive inverses $-(a_1,\dots,a_n)=(-a_1,\dots,-a_n)$ follow immediately from the corresponding properties in $\mathbb{F}_q$.
  • For scalar multiplication, distributivity, associativity, and the identity element $1\in\mathbb{F}_q$ also transfer component-wise.

Hence the standard 8 vector-space axioms hold, so $\mathbb{F}_q^{\,n}$ is indeed a vector space over $\mathbb{F}_q$.


A basis and the dimension

Consider the $n$ canonical unit vectors

$$ e_1=(1,0,\dots,0),\;e_2=(0,1,0,\dots,0),\;\dots,\;e_n=(0,\dots,0,1) \in\mathbb{F}_q^{\,n}. $$

  • Spanning: Any vector $v=(a_1,\dots,a_n)$ can be written

    $$ v=a_1e_1+\dots+a_ne_n, $$

    so $\{e_1,\dots,e_n\}$ spans $\mathbb{F}_q^{\,n}$.

  • Linear independence: If $\lambda_1e_1+\dots+\lambda_ne_n=0$ then each coordinate is $\lambda_i=0$ in $\mathbb{F}_q$, so the only linear relation is the trivial one.

Therefore $\{e_1,\dots,e_n\}$ is a basis. A basis has exactly $n$ vectors, so the dimension of $\mathbb{F}_q^{\,n}$ over $\mathbb{F}_q$ is $n$.

$$ \boxed{\dim_{\mathbb{F}_q}\bigl(\mathbb{F}_q^{\,n}\bigr)=n.} $$

On the Primitive Term of Logistic

Tell me about "On the primitive term of logistic"

What is it?

  • Title (original): O wyrazie pierwotnym logistyki
  • Author: Alfred Tarski (then publishing under the Polish spelling Tajtelbaum-Tarski)
  • Form: Doctoral dissertation defended at the University of Warsaw in 1924; first printed (in Polish) in Przegląd Filozoficzny 26 (1923); authoritative English translation in Tarski’s Logic, Semantics, Metamathematics (1956, 2nd ed. 1983) (Wikipedia, Google Books)
  • Length & setting: Roughly 25 journal pages; written inside the vibrant Warsaw‐school tradition led by Leśniewski, Łukasiewicz and others.

The central problem

Tarski asks:

Can one truth-functional sign, together with the usual quantifiers, serve as the sole primitive basis of “logistic” (i.e. classical first-order logic)?*

At the time logicians already knew two single-connective solutions:

Solution Primitive sign Discovered by
Implication (⊃) Bertrand Russell (1910)
Sheffer stroke (NAND / ↑ or NOR / ↓) Henry Sheffer (1913)

Tarski’s twist is to try material equivalence (↔) instead. In his view the biconditional has two attractive features that the others lack:

  1. Natural definitional shape – every definition can be phrased as an equivalence.
  2. Symmetry & reflexivity – ↔ treats its arguments on a par, mirroring the idea that definitions connect two sides of an identity. (Internet Encyclopedia of Philosophy)

How he does it (sketch)

  1. Fundamental Theorem – Tarski shows how to define conjunction (p ∧ q) using only ↔, variables and a single universal quantifier:

    p ∧ q   ≡   ∀f [ (p ↔ f(r)) ↔ (q ↔ f(r)) ]
    

    (Here f is a variable for unary propositional functions, r a variable.)

  2. Cascade of definitions – Once ∧ is available, he derives ¬, ∨, →, ⊥, etc., in the standard style of Whitehead-Russell.

  3. Metatheoretic reflection – He explores when such reductions are legitimate, noting they should not smuggle in new constants and should be compatible with any reasonable type theory (he cites a system of Leśniewski as an existence proof).

Why it matters

  • Historical pivot – This was the only PhD ever supervised by Stanisław Leśniewski, and it marks the first major publication of the 22-year-old Tarski, foreshadowing his lifelong concern with definitions and metalogical economy. (Wikipedia)
  • Economy of primitives – Tarski’s method fueled later work on “equivalential calculi,” systems whose sole connective is ↔. These became a laboratory for studying definability, functional completeness and replacement properties (today visible in algebraic logic and structural proof theory).
  • Influence on protothetic – Leśniewski’s own generalized propositional logic (Protothetic) eventually adopted ↔ as its only sentential connective, a move explicitly justified by Tarski’s proof.
  • Pre-echo of model theory – The attention to arbitrary interpretation of function variables anticipates Tarski’s later semantic conception of truth and his use of schematic functional parameters in model‐theoretic arguments.

Reading tips & modern connections

  • Where to find it in English: pp. 1-23 of Logic, Semantics, Metamathematics (Hackett 1983); the translation preserves Tarski’s original notation but adds section headings. (Google Books)
  • Notation quirks: Quantifiers are written with leading dots (·[x]), and ↔ is denoted ‘==’. If you map these to ∀ and ↔, the proofs are straightforward Hilbert-style derivations.
  • Limitations: Using ↔ without quantifiers is not functionally complete; Tarski’s reduction is essentially second-order (it quantifies over propositional functions). Later results (Post, Meredith, Kalmar) sharpened the analysis of single-connective completeness inside pure propositional logic.
  • Legacy: Ideas from the paper resurface in single-axiom systems (e.g., Meredith’s single-axiom for classical logic) and inform contemporary proof-compression techniques in automated reasoning.

One-sentence takeaway

Tarski’s On the Primitive Term of Logistic is a youthful yet remarkably sophisticated demonstration that the elegant biconditional ↔—paired only with quantification—suffices to generate the whole machinery of classical logic, inaugurating a research program on the logical and philosophical significance of our choice of primitive notions.

Friday, August 1, 2025

Anonymous feedback benefits

Cate Hall says:

Seek real feedback

It’s hard to overstate how overpowered this one is. If you aren’t trying to get real feedback from people who know you, you’re cooking without tasting. This is, like, the lowest hanging fruit for self-improvement, but few people really try to pick it.

In many contexts, the way to get good feedback is to give people a way to provide it anonymously. Anything else creates friction by layering on social dynamics. To get honest feedback, you want to make it as comfortable as possible for people to give it. You also want to make it easy to find -- I have a link to my feedback form in my Twitter bio, and get a few comments a week through it.

I imagine resistance from some people on the grounds that anonymity frees people to be assholes, but in my experience they rarely are. 90% of what I get in my inbox is either nonsense or nice -- I get lots of “keep up the good work!” type messages. In over a year, I’ve gotten maybe two messages intended to hurt my feelings. Once in a while, I get a message that’s a gut punch because it calls my attention to a real issue -- but then I get over it and get to work fixing the issue. (I wish people gave me more feedback -- I had to learn about my uptalk from YouTube comments.)

I don’t fully get it, please develop her argument a bit more. What are some kinds of people who might not want to criticize me to my face but might do so anonymously? I can only think of people who don’t really know me well, since then I’d question that they’re qualified to criticize me, but that’s a point against allowing anonymous criticism, not in favor.

Cate Hall’s point is that anonymity mainly removes the social and power-dynamic costs that keep people who actually know you from being fully candid. Below are several groups that often do have useful insight but will sometimes bite their tongues unless you give them a friction-free, anonymous channel:

Who might stay silent? What holds them back face-to-face? Why their feedback still matters
Direct reports / junior teammates Fear of retaliation, stalled promotions, or being labelled “not a team player.” In most orgs the power imbalance is real. They see your leadership habits daily; their vantage point is uniquely valuable for improving management style. Research on employee surveys shows anonymity encourages “the silent” to speak up candidly (business.com).
Peers & cross-functional colleagues Social-capital risk: honest critique could strain a collaborative relationship or expose them to reciprocal criticism. People default to “polite but vague.” They understand your work context and inter-dependencies better than outsiders; you learn how you’re impacting partner teams.
Mentors, higher-status contacts, or senior execs It can feel awkward—or politically unwise—to punch down with direct criticism, especially if you’re junior or outside someone’s reporting line. Their feedback is often the most experienced and strategic, but they have to feel 100 % safe to deliver a “hard truth.”
Friends & family Emotional cost: they don’t want to hurt your feelings or spark conflict at Thanksgiving. They observe long-term patterns (communication quirks, blind spots) you won’t see yourself.
Students, community members, or anyone who benefits from you Gratitude or dependence can create a “gratitude tax”: criticizing might feel ungrateful. They’re end-users of your teaching, content, or leadership and can flag issues you’d never notice.
Online followers / customers Public criticism risks backlash from your fan base or other customers; private DM still isn’t fully safe. They experience the output of your work directly and can report real-world impact.

Why anonymity flips the cost-benefit equation

  1. Removes fear of retaliation or judgment – multiple workplace studies show people give more honest, detailed feedback when names are hidden (Lattice).
  2. Reduces social-desirability bias – even peers who could speak up often soften the message to avoid awkwardness; anonymity lets them transmit the unfiltered signal (feedbackfruits.com).
  3. Encourages participation from the quiet majority – in surveys, the people who rarely speak in meetings are the ones most likely to use an anonymous channel (business.com).
  4. Makes it easy to “taste while cooking” – by lowering friction (a short form link), you collect a continuous trickle of observations instead of sporadic performance-review dumps.

Handling quality concerns

  • Noise & trolls: yes, you’ll get “nonsense or nice,” as Hall says. Filter for patterns—three independent comments on the same issue beat one exquisitely argued email.
  • Qualification of the critic: ask for context in the form (e.g., “How do you know my work?”). That lets you weigh comments from close collaborators more heavily without revealing their identity.
  • Follow-up: aggregate feedback into themes you can act on—then tell your circle what you changed. When people see results, the quality of submissions improves.

Take-aways

  • The very people whose opinions you should care about often have the most to lose socially by being frank; anonymity lowers that cost.
  • Anonymous feedback isn’t a replacement for direct conversation, but a complementary “early-warning radar.” Use it to spot issues, then decide which ones merit a live discussion.
  • Treat every anonymous comment as a data point, not a verdict—look for converging signals across many submissions.

Framed this way, anonymity isn’t about empowering random strangers; it’s about liberating credible insiders to help you “taste the dish” before you serve it.

Note: The source for what Cate Hall said is here.

Thursday, July 31, 2025

Ladylike women

What are some famous women who are known (among their other traits) for being ladylike, such that it would be unthinkable to imagine them being vulgar or indecent

Audrey Hepburn’s ‘Roman Holiday’ Pearl Necklace Is Just One Highlight Of Geneva’s Legendary ...

Below is a deliberately eclectic (and certainly non-exhaustive) set of women whose public personas are almost synonymous with grace, composure, and a refusal to descend into crudity—so much so that it feels odd to picture them behaving otherwise. “Ladylike” is, of course, a culturally loaded word, but these figures are consistently cited as exemplars of good-humoured dignity rather than prim severity.

Timeless screen & stage icons

Woman Why her name comes up when people say “elegance” Representative note
Audrey Hepburn Her pared-down style, gentle voice, and decades of UNICEF field work forged a reputation for quiet refinement both on and off camera. (Viveura)
Grace Kelly (Princess Grace of Monaco) The Hitchcock star turned princess introduced a cool, polished aesthetic that is still referenced in fashion textbooks under “the Kelly look.” (Grace de Monaco)
Julie Andrews From Mary Poppins to her SAG life-achievement speech, Andrews has been celebrated for a warm, reassuring presence that critics routinely call “regal” and “gracious.” (Facebook)

Royal exemplars

Woman Why she fits the brief Representative note
Queen Elizabeth II Seven decades of duty executed with unflappable composure made “Her Majesty” shorthand for poise under pressure. (My Social Work News)
Diana, Princess of Wales Her compassionate hospital visits and handshake with an AIDS patient reset royal protocol with empathy—never brusqueness. (Medium)
Catherine, Princess of Wales Continues the Windsor tradition of restraint; British papers routinely praise her for “poise and polish” during engagements. (Facebook)

First Ladies & public servants

Woman Why she’s on the list Representative note
Jacqueline Kennedy Onassis Her pillbox hats and French gowns were only half the story; colleagues recall an editor who wielded quiet authority without raising her voice. (Antique Trader)
Michelle Obama Mixes warmth with eloquence; even critics concede that she projects “strength, grace and resilience” while keeping discourse civil. (REVOLT)

Contemporary professionals & activists

Woman Why she’s cited Representative note
Amal Clooney The human-rights barrister’s courtroom gravitas and red-carpet minimalism have made her a modern style-and-substance archetype. (W Magazine)
Emma Watson Her poised UN speeches and intentionally polished fashion choices have framed her feminism within a context of deliberate civility. (Facebook)

A closing thought

What all of these women share is less a set of fashion rules than a habit of considering others—tempering wit, conviction, or even activism with courtesy. That impulse, rather than hemlines or pearl necklaces, is what makes vulgarity feel out of character for them.

Ernest Benn Reading List for Voters

"In the ideal state of affairs, no one would record a vote in an election until he or she had read the eleven volumes of Jeremy Bentham and the whole of the works of John Stuart Mill, Herbert Spencer and Bastiat as well as Morley's Life of Cobden." - Ernest Benn

This quote made me curious to check out those books, however, there is no eleven-volume collection of Bentham currently in print, so please make me an updated reading list based on this quote.

A Practical “Benn List” for Twenty-First-Century Voters

Below is a streamlined syllabus that captures the spirit of Ernest Benn’s tongue-in-cheek prescription—giving you the essential arguments each thinker wanted citizens to weigh before casting a ballot. For every author you’ll see:

  • Core texts (★) – the minimum to grasp their programme.
  • Deep cuts (◇) – where to go next if the core hooks you.
  • Recommended modern edition / access point – in print or freely online.

1. Jeremy Bentham (1748-1832) – founding utilitarian & legal reformer

Tier Title Why it matters Modern access
An Introduction to the Principles of Morals and Legislation (1789) Bentham’s utilitarian calculus & the “greatest happiness” rule. Oxford World’s Classics re-issue (paper, 2020) (Amazon)
The Panopticon Writings Shows his obsession with institutional design and surveillance. Verso Radical Thinkers, 2nd ed. (2011/2024) (Verso)
Rights, Representation & Reform: “Nonsense upon Stilts”… His ferocious attack on natural-rights theory; key to modern rights debates. Collected Works vol. 2, OUP (2002) (oxfordscholarlyeditions.com)
Of Laws in General A blueprint for a scientific jurisprudence. Collected Works, Athlone/OUP (1995 reprint) (Amazon)
For completists: the original 11-volume Bowring edition (1838-43) – digitised free at Liberty Fund. (Liberty Fund) + UCL’s Collected Works project (36 vols. so far, open access). (University College London)

Suggested path: read Introduction, then jump to “Nonsense upon Stilts” for the rights debate, and dip into the Panopticon letters for flavour.


2. John Stuart Mill (1806-1873) – liberal utilitarian for the modern electorate

Tier Title Modern access
Quad-pack: On Liberty, Utilitarianism, Considerations on Representative Government, The Subjection of Women All four in one Oxford World’s Classics volume (2nd ed., 2015) (Amazon)
Autobiography Collected Works vol I, Liberty Fund (free) (Liberty Fund)
Principles of Political Economy (abridged) Hackett ed., 2004 / 2021 reprint (hackettpublishing.com)
Collected Works (33 vols.) – key vols now in affordable paper (Liberty Fund) (Liberty Fund)

Suggested path: Read the quad-pack straight through; follow with the Autobiography to see Mill apply those principles to his own political life.


3. Herbert Spencer (1820-1903) – evolution-driven individualism

Tier Title Modern access
Social Statics (1851) Liberty Fund online facsimile (Liberty Fund)
The Man versus the State (1884) Liberty Fund paperback (2020 re-run) (Liberty Fund)
The Principles of Ethics (2 vols.) Legare Street Press reprint, 2023 (Amazon)
Education: Intellectual, Moral & Physical Dover thrift ed., 2004 (Amazon)

Suggested path: Social StaticsMan versus State for the mature political attack on state overreach; dip into Education for his applied philosophy.


4. Frédéric Bastiat (1801-1850) – the free-trade pamphleteer

Tier Title Modern access
The Law (1850) in Liberty Fund’s Collected Works vol. 3 or FEE booklet (pocket size) (Liberty Fund)
Economic Sophisms Liberty Fund “Collected Sophisms” (2018 digital) (Liberty Fund)
Selected Essays on Political Economy FEE trade pbk (1995) (Amazon)
Harmonies of Political Economy Legare Street Press reprint, 2023 (Amazon)
Full 6-volume Collected Works (Liberty Fund, ongoing). (Liberty Fund)

Suggested path: Start with The Law (30 pages) for a lightning-bolt intro; then the Sophisms essays to watch him demolish protectionism.


5. John Morley’s Life of Richard Cobden (1867/79) – context for free-trade politics

  • Core: 2-volume Cambridge Library Collection reprint (2011); or free Liberty Fund HTML/PDF. (Amazon, Liberty Fund)
  • Supplement: Letters of Richard Cobden digital archive (2023) for primary sources. (The History of Parliament)

Read alongside Bastiat to see how free-trade arguments played out on the floor of Parliament.


How to Tackle the List

  1. Short-to-long spiral – begin with Bastiat’s pamphlets (quick wins), then Mill’s On Liberty, before diving into Bentham or Spencer.
  2. Mix authors – alternate utilitarians (Bentham/Mill) with free-market polemic (Bastiat/Cobden) to keep ideas fresh.
  3. Allowance for time – the ★ items total ~2,400 pages—doable in a year at 50 pp/week. Deeper cuts add as curiosity allows.

Free & open resources

Almost everything above can be read gratis via Liberty Fund’s Online Library of Liberty, Econlib, or archive.org; the recommended print editions give you introductions, annotations, and pagination useful for citation.

Happy (and electorally responsible) reading!

Wednesday, July 30, 2025

Alice Liability for Tree

Suppose there are two plots of land, one owned by Alice and one owned by Bob. Bob's property has a fence around it, which is also owned by Bob. Alice's property has some trees, which are fully on Alice's side. However, lightning strikes and brings one tree down. This makes it fall over and break part of Bob's fence. In what kinds of jurisdictions is Alice liable for this?

The short answer

Outside a few narrow, mostly academic possibilities, Alice would not be liable when a healthy tree is toppled by lightning and damages Bob’s fence. In almost every modern system—common‑law and civil‑law alike—the combination of a healthy tree and a truly unforeseeable, irresistible natural event (“an act of God” or force majeure) breaks the chain of legal causation or supplies Alice with a complete defence.

Below is a map of how the major families of legal systems treat the problem and where (in theory) Alice might still face liability.


1. Fault‑based common‑law jurisdictions

(England & Wales, nearly all U.S. states, Canada, Australia, etc.)

Core rule Practical result for Alice
A land‑owner owes only a duty of reasonable care to inspect and maintain trees. Liability arises only if the owner knew or should have known the tree was dangerous and failed to act. A sudden act of nature is a complete defence (“act‑of‑God doctrine”). Because the tree was healthy and the damage was caused by lightning, Alice has no fault; Bob must claim on his own insurance. (Merchants Insurance Group, forthepeople.com)

When could she be liable here? If the tree had been visibly diseased, leaning, or previously struck (i.e., Alice had notice of a hazard) courts apply ordinary negligence. Some states spell this out explicitly—e.g., the Restatement illustration where a lightning‑killed tree is left standing for a year and then falls (koleyjessen.com).


2. Strict‑liability civil‑code jurisdictions

(France, Québec, Spain, pre‑1996 Louisiana, etc.)

2 a. Liability for “things in one’s custody”

Article 1242 §1 of the French Code (mirrored in many civilian systems) and its Louisiana analogue (old C.C. art. 2317) impose objective liability for damage caused by a “thing” one guards—even without personal fault. Louisiana’s Loescher v. Parr applied that idea to diseased trees. (Justia Law)

2 b. The escape hatch: force majeure

The same civil codes also say that a guardian is exonerated if the damage is due to an event that is (i) external, (ii) unforeseeable, and (iii) irresistible—the civilian version of an act of God. Lightning satisfies all three criteria in normal conditions, so the owner escapes liability. (Wikipedia)

Scenario Healthy tree ‑ lightning Diseased tree ‑ ordinary wind
Outcome Owner not liable (force majeure) Owner usually liable (defect created an unreasonable risk and wind was foreseeable)

Bottom line: even the “strict” civilian systems still free Alice when the only cause is lightning.


3. Exceptional regimes that could, in theory, trap Alice

  1. Statutory no‑fault compensation schemes – A few jurisdictions experiment with laws that spread losses from natural hazards without regard to fault (e.g., some Scandinavian environmental‑risk statutes). They are rare and usually capped by government funds, not true tort liability.
  2. Contractual or insurance subrogation – Alice could be pulled in only if her own insurer indemnifies Bob and then seeks reimbursement, but the insurer would still have to prove negligence or the absence of a force‑majeure defence under the governing law.

4. Practical takeaway

  • In mainstream common‑law or civil‑law jurisdictions, a healthy tree felled by lightning is classified as an “act of God” / force majeure event.
  • Liability shifts only when the owner’s fault (notice of decay, improper felling, etc.) contributes to the damage.
  • Truly strict regimes with no force‑majeure escape are practically non‑existent; where strict liability exists, the same codes also enshrine the force‑majeure defence.

So, unless Alice ignored warning signs that the tree was dangerous before the storm, she can sleep soundly in almost any legal system.

Enslaved pilot dilemma

I asked ChatGPT to think about a moral dilemma about an enslaved pilot from different perspectives. The answers were pretty much determined by the conclusion it wanted to give, but not too bad for all that.

Tuesday, July 29, 2025

Nonprime N Where All Groups of Order N Are Isomorphic

Is there nonprime n where all groups of order n are isomorphic?

Yes—there are plenty of composite (non‑prime) integers $n$ for which every group of order $n$ is forced to be the same (indeed, cyclic). The smallest example is

$$ n = 15 = 3\cdot5 . $$

Because $\operatorname{Aut}(C_{5})\cong C_{4}$ has no element of order 3, no non‑trivial semidirect product $C_{5}\rtimes C_{3}$ can be formed, so the only group of order 15 is the cyclic one $C_{15}$.


The complete criterion

Let

$$ n=p_{1}p_{2}\cdots p_{k}\quad (p_{1}<p_{2}<\dots<p_{k}) $$

be the prime–factorisation of $n$.

All groups of order $n$ are isomorphic iff

  1. $n$ is square‑free (no $p_{i}^{2}\mid n$), and

  2. for every pair of primes with $p_i < p_j$ one has

    $$ p_i\nmid (p_j-1). $$

Why these two conditions are necessary.

  • If a prime square $p^{2}$ divides $n$, the abelian groups $C_{p^{2}}$ and $C_{p}\times C_{p}$ give two non‑isomorphic examples.
  • If $p_i\mid(p_j-1)$ for some $i<j$, there exists a non‑trivial action $C_{p_i}\to\operatorname{Aut}(C_{p_j})$, producing the non‑abelian semidirect product $C_{p_j}\rtimes C_{p_i}$ alongside the cyclic one.

Why they are sufficient. With $n$ square‑free, every Sylow subgroup is cyclic. Condition (2) forces each Sylow subgroup to be normal (Sylow counts give $n_{p_i}\equiv1\pmod{p_i}$ and $n_{p_i}\mid n/p_i$; if $p_i$ divided some $p_j-1$ we could have a non‑normal Sylow). A direct product of mutually normal cyclic Sylow subgroups is cyclic, so every group of that order is $C_n$.


Infinitely many such $n$

Choose any set of distinct primes with no divisibility relations of the form $p_i\mid(p_j-1)$. Products of two primes are easiest:

$n=pq$ Is every group cyclic? Reason
$15=3\cdot5$ Yes $3\nmid 4$
$33=3\cdot11$ Yes $3\nmid10$
$35=5\cdot7$ Yes $5\nmid6$
$39=3\cdot13$ Yes $3\nmid12$

Whenever $p<q$ and $p\nmid(q-1)$, there is only the cyclic group of order $pq$; thus there are infinitely many composite $n$ with the desired property.


Summary

So the answer is yes: the composite integers satisfying the two conditions above (beginning with 15) have exactly one group structure—namely the cyclic group $C_n$.

Friday, July 25, 2025

What are Seven-Ten lists?

In the ada palmer universe, what are the "seven ten lists"?

In Terra Ignota—the 25th-century setting of Ada Palmer’s quartet—“Seven-Ten Lists” are eagerly awaited power-rankings published by the world’s most influential news outlets. Each list names ten people who matter right now, but with a twist:

Slots What they signal
1 – 7 (“the Seven”) A sober, quasi-statistical judgment about who really controls the fate of the planet—usually the heads of the great Hives or other actors whose combined clout could tip the world into war or keep it at peace.
8 – 10 (“the Ten”) Lower-stakes kudos for rising celebrities, cultural icons, or outlier talents—people whose fame matters, but whose influence is not (yet) civilization-breaking.

Think of the Seven-Ten as a hybrid between Time’s “Person of the Year,” a Wall Street index, and a bookmakers’ odds sheet: placement on the list instantly sways markets, public confidence, and political maneuvering. (terra-ignota.fandom.com)

Why the name “Seven-Ten” if there are only ten names?

The first seven are what everyone argues over; the extra three are almost garnish. Hence “Seven-Ten” became shorthand, even though the document itself is only ten lines long.

How often and by whom?

Major newspapers or broadcast syndicates in each Hive issue their own list—normally once a year, but special editions appear whenever the political temperature spikes. The Black Sakura paper in Tokyo, for example, is famous for its list. (terra-ignota.fandom.com)

Plot weight inside the novels

The theft and replacement of a Black Sakura Seven-Ten List is the fuse that ignites the Days of Transformation chronicled in Too Like the Lightning and Seven Surrenders; once an altered list circulates, rivals scramble to confirm or refute the rankings, alliances wobble, and the utopian façade cracks. (Jayde Holmes)

In short, the Seven-Ten Lists are the series’ canary in the geopolitical coal-mine: a deceptively simple top-ten chart whose shifting names warn both characters and readers that the balance of world power is about to lurch.

Reading list on the formal mathematical study of board games

What are some of the best books that try to study board games in a formal mathematical way?

Below is a compact reading‑map that most researchers and advanced hobbyists follow when they want to treat board games as mathematics rather than mere recreation. I’ve grouped the titles by the role they usually play in a self‑study program and noted what each one actually does for you.


1. Bedrock texts — where the modern theory began

Title Why it matters Typical level
On Numbers and Games — John H. Conway (2nd ed., 2001) Introduces surreal numbers and the algebra that underlies all combinatorial game theory (CGT). A thin but dense book that defines the subject’s vocabulary. (Amazon) Graduate‑level abstract algebra / set theory
Winning Ways for Your Mathematical Plays, Vols. 1 – 4 — Berlekamp, Conway, & Guy (2nd ed. 2018–2024) The classic encyclopedia: impartial games (Nim‑type), partizan games, misère play, thermographs, hot/cold values, and dozens of concrete board‑game case studies. Readable once you’ve sampled ONAG. (Amazon, Amazon) Upper‑undergraduate to research

2. Friendly introductions / textbooks

Title What you’ll get Level
Lessons in Play, 2nd ed. — Albert, Nowakowski & Wolfe (2019) A pedagogical walk from Nim to CGT algebra with hundreds of exercises and fully worked examples. Great first book if Winning Ways feels too brisk. (Routledge) Advanced undergrad
Combinatorial Game Theory — Aaron N. Siegel (AMS GSM 146, 2023) A modern, theorem‑proof treatment that unifies the field’s last 30 years and cleans up notation. Becomes the standard reference once you want full rigor. (Amazon) Graduate text

3. Research‑level compilations

  • Games of No Chance series (MSRI Publ. Vols. 29, 42, 56, 63, & 90; vol. 5 appeared 2019) — edited collections of cutting‑edge papers on CGT structure, new game values, and solved board‑game endgames. (Cambridge University Press & Assessment)

4. Monographs that dissect specific board games

Game Book Highlight
Go Mathematical Go: Chilling Gets the Last Point — Berlekamp & Wolfe (aka Mathematical Go Endgames) Uses CGT thermography to solve real professional endgames and introduces “chilling” as a cooling technique. (Amazon, Amazon)
Dots‑and‑Boxes The Dots and Boxes Game: Sophisticated Child’s Play — Berlekamp (2000) Turns a playground pastime into a solved impartial game; shows how to read the nim‑value of any position. (Amazon)
(Many other titles exist for Hex, Domineering, Amazons, etc., but the two above are the gold‑standards for single‑game depth.)

5. Algorithmic & complexity‑theoretic perspectives

Resource What it covers Use‑case
Games, Puzzles, and Computation — Hearn & Demaine (2009) Reduces dozens of real board games (Rush Hour, Reversi, generalized Chess/Go) to complexity‑class hard problems via Constraint Logic. (Amazon) When you care about NP/PSPACE/EXPTIME results
“Algorithmic Combinatorial Game Theory” survey — Demaine & Hearn (2001; updated in Games of No Chance 3) A readable overview of algorithmic techniques and open problems. (erikdemaine.org) Quick orientation before diving into proofs
Algorithmic Game Theory (SAGT 2024 Proceedings) Latest papers on computational aspects, including hardness proofs for new tabletop titles. (Amazon) Keeping current with 2020‑s research

How to read them in practice

  1. Start light: skim a chapter of Lessons in Play to see the main definitions and the Sprague‑Grundy theorem at work.

  2. Build foundations: dip into On Numbers and Games for the surreal‑number construction, then sample the early chapters of Winning Ways to see those ideas applied.

  3. Choose a specialty:

    • If you enjoy solving concrete board games, grab the relevant monograph (Go, Dots‑and‑Boxes, etc.).
    • If you’re pulled toward algorithms or CS theory, pivot to Hearn & Demaine.
  4. Circle back to Siegel’s textbook once you want complete proofs of structural results such as the Atomic‑Weight Lemma or canonical forms.

  5. Stay current by browsing the Games of No Chance volumes or SAGT proceedings whenever a new one appears (roughly every 3‑4 years).

Taken together, these works will carry you from the first Nim pile all the way to the current research frontier. Happy reading—and happy playing!

Monday, July 21, 2025

Natural language formal grammars

Nowadays what's the most advanced fully formalized formal grammar for a natural language?

Short answer : For a single natural language, the English Resource Grammar (ERG)—currently at its May 2025 release—is generally regarded as the most advanced, fully formalised grammar that actually runs on a computer. It is hand-built in the HPSG formalism, covers 90-plus % of open-domain English, and produces logic-ready Minimal Recursion Semantics (MRS) representations. (Delph-in)


Why the ERG stands out

Aspect What the ERG offers
Theoretical foundation Head-Driven Phrase-Structure Grammar with a rich type hierarchy of 1 100+ lexical/phrased-structure types
Coverage & precision ~35 000 lexemes, ~200 syntactic rules; parses ≈ 94 % of Wall-Street-Journal sentences and > 90 % of contemporary web text while staying linguistically faithful (iafisher.com)
Semantics Direct compositional output in MRS, compatible with downstream inference, QA, RTE and MT pipelines (Delph-in)
Tool chain Ships as a binary grammar (“erg-2025-x86-64-0.9.34.dat”) for the ACE parser and for LKB/pyDelphin; also accessible through a REST API (Delph-in)
Sustained maintenance Active DELPH-IN community, annual releases; latest tagged 2025

Because every rule, feature structure and semantic predicate is machine-checkable, ERG is what linguists call a precision grammar: if it accepts a sentence, it guarantees an internally consistent syntactic and semantic analysis. That property makes it the go-to resource for deep NLP experiments and for testing linguistic hypotheses.


How does it compare to other large formal grammars?

Project Formalism Languages Maturity & scope
ParGram / XLE grammars Lexical-Functional Grammar (LFG) ≈ 10 major languages (EN, FR, DE, JA…) High-quality parallel grammars but smaller coverage per language; used mainly in grammar-checking research (iafisher.com)
GF Resource Grammar Library (RGL) Type-theoretical GF 45 + languages Elegant multilingual framework for generation & controlled NL; not yet as deep or wide-coverage per language as ERG (grammaticalframework.org)
OpenCCG / CCGBank grammar Combinatory Categorial Grammar English Grammar induced from CCGBank; broad but automatically derived, with less hand-verified precision than ERG (GitHub)
Resource Grammars (Jacy, SRG, etc.) HPSG Japanese, Spanish, Norwegian… Built with the same methodology as ERG; none yet match ERG’s size or stability (e.g. Spanish RG revival 2024)

In short, those projects show that formalised, executable grammars are feasible for many languages, but the ERG remains the flagship in terms of depth, breadth, and semantic integration.


Take-away

If you need a fully formal, broad-coverage, linguistically rigorous grammar that you can parse and generate with today, the ERG is the state of the art. For cross-lingual work, look toward the GF RGL or the ParGram LFG suite, but be prepared for more limited coverage or weaker semantic output.

Completeness of isohedral figure classification

The table below was simplified from the table at this Wikipedia article.

Here is a table of isohedral figures from Wikipedia. Is it proven that all isohedral figures must be one of these things – a Platonic solid, a Catalan solid, or one of these pyramid-stacking “polar” figures?

Faces Face config. Class Name Symmetry Order
4 V33 Platonic tetrahedron Td, [3,3], (*332) 24
4 V33 Platonic tetragonal disphenoid D2d, [2+,2], (2*) 4
4 V33 Platonic rhombic disphenoid D2, [2,2]+, (222) 4
6 V34 Platonic cube Oh, [4,3], (*432) 48
6 V34 Platonic cube D3d, [2+,6] 12
6 V34 Platonic cube (2*3) 12
6 V34 Platonic trigonal trapezohedron D3 6
6 V34 Platonic asymmetric trigonal trapezohedron [2,3]+, (223) 6
8 V43 Platonic octahedron Oh, [4,3], (*432) 48
8 V43 Platonic octahedron D4h,[2,4],(*224) 16
8 V43 Platonic octahedron D2h,[2,2],(*222) 8
8 V43 Platonic square bipyramid D2d,[2+,4],(2*2) 8
8 V43 Platonic rhombic bipyramid D2d,[2+,4],(2*2) 8
8 V43 Platonic square scalenohedron D2d,[2+,4],(2*2) 8
12 V35 Platonic regular dodecahedron Ih, [5,3], (*532) 120
12 V35 Platonic regular dodecahedron Th, [3+,4], (3*2) 24
12 V35 Platonic regular dodecahedron T, [3,3]+, (*332) 12
12 V35 Platonic pyritohedron T, [3,3]+, (*332) 12
12 V35 Platonic tetartoid T, [3,3]+, (*332) 12
20 V53 Platonic regular icosahedron Ih, [5,3], (*532) 120
12 V3.62 Catalan triakis tetrahedron Td, [3,3], (*332) 24
12 V(3.4)2 Catalan rhombic dodecahedron Oh, [4,3], (*432) 48
12 V(3.4)2 Catalan rhombic dodecahedron Td, [3,3], (*332) 24
12 V(3.4)2 Catalan deltoidal dodecahedron Td, [3,3], (*332) 24
24 V3.82 Catalan triakis octahedron Oh, [4,3], (*432) 48
24 V4.62 Catalan tetrakis hexahedron Oh, [4,3], (*432) 48
24 V3.43 Catalan deltoidal icositetrahedron Oh, [4,3], (*432) 48
48 V4.6.8 Catalan disdyakis dodecahedron Oh, [4,3], (*432) 48
24 V34.4 Catalan pentagonal icositetrahedron O, [4,3]+, (432) 24
30 V(3.5)2 Catalan rhombic triacontahedron Ih, [5,3], (*532) 120
60 V3.102 Catalan triakis icosahedron Ih, [5,3], (*532) 120
60 V5.62 Catalan pentakis dodecahedron Ih, [5,3], (*532) 120
60 V3.4.5.4 Catalan deltoidal hexecontahedron Ih, [5,3], (*532) 120
120 V4.6.10 Catalan disdyakis triacontahedron Ih, [5,3], (*532) 120
60 V34.5 Catalan pentagonal hexecontahedron I, [5,3]+, (532) 60
2n V33.n Polar trapezohedron Dnd, [2+,2n], (2*n) 4n
2n V33.n Polar trapezohedron Dn, [2,n]+, (22n) 2n
2n V33.n Polar asymmetric trapezohedron Dn, [2,n]+, (22n) 2n
2n V42.n Polar regular n-bipyramid Dnh, [2,n], (*22n) 4n
2n V42.2n Polar isotoxal 2n-bipyramid Dnh, [2,n], (*22n) 4n
2n V42.2n Polar 2n-scalenohedron Dnd, [2+,2n], (2*n) 4n
4n V42.2n Polar 2n-scalenohedron Dnd, [2+,2n], (2*n) 4n

Short answer

Yes – for convex polyhedra the classification is finished. Branko Grünbaum and Geoffrey C. Shephard completed it in their study of isohedral (face-transitive) tilings of the sphere, and the result is exactly what your table shows:

  • 5 Platonic solids

  • 13 Catalan solids (duals of the Archimedean solids)

  • Three infinite polar families

    • the (general) scalenohedra / isosceles tetrahedra
    • the $n$-bipyramids (duals of prisms)
    • the $n$-trapezohedra (duals of antiprisms)

Together these make up 30 “classes’’: 28 individual solids and 2 one-parameter families whose face-count grows with $n$. MathWorld’s Isohedron page quotes the same total and traces it to the Grünbaum–Shephard work (MathWorld), while Wikipedia summarises the duality-based reasoning – Platonic ↔ Platonic, Archimedean → Catalan, prism → bipyramid, antiprism → trapezohedron (Wikipedia).

What the proof looks like (in outline)

  1. Work on the sphere. Any convex polyhedron gives a tiling of the unit sphere by projecting its faces outward.

  2. Classify all face-transitive spherical tilings. Grünbaum & Shephard (1981) listed every way a single tile can repeat around the sphere under a finite symmetry group.

  3. Lift the tilings back to space. Each tiling corresponds to either

    • a Platonic solid,
    • the dual of a uniform spherical tiling (hence a Catalan solid), or
    • a 2-cap tiling whose dual is a bipyramid or trapezohedron. No other convex embedding exists – that’s the heart of the proof.

Because the argument happens on the sphere, it automatically rules out any stray convex isohedra that look different but would project to one of the known patterns.

Limits of the result

  • If you drop convexity (allow self-intersection or star faces) there are many more isohedra, starting with the four Kepler–Poinsot polyhedra, and no complete list is known.
  • If you go up one dimension (4-polytopes) or down to tilings of the plane, the problem is again open.
  • Even in 3-D, the weaker “all faces merely congruent’’ condition (monohedral) is not classified; several sporadic convex examples are known that are not isohedral (Mathematics Stack Exchange).

So, within the usual confines of convex solids the answer is yes – every isohedron is either Platonic, Catalan, or one of the polar stack-of-pyramids families on your list. Outside that safe zone, the zoo is still very much alive and un-catalogued.

Do you have the citation for the study by Branko Grünbaum and Geoffrey C. Shephard?

Below is the full bibliographic information that most authors cite when they refer to the Grünbaum–Shephard classification of isohedral (face-transitive) spherical tilings—which, in turn, yields the list of convex isohedral polyhedra you asked about.

Ref. Standard citation (APA-style) Notes
[GS 1981a] Grünbaum, B., & Shephard, G. C. (1981). Spherical tilings with transitivity properties. In C. Davis, B. Grünbaum & F. A. Sherk (Eds.), The Geometric Vein: The Coxeter Festschrift (pp. 65-98). Springer-Verlag. https://doi.org/10.1007/978-1-4612-5648-9_4 The definitive, worked-out classification of all isohedral, isotoxal and isogonal tilings of the 2-sphere. Convex isohedral polyhedra correspond to these tilings via radial projection and duality. (SpringerLink)
[GS 1981b] Grünbaum, B., & Shephard, G. C. (1981). Patterns on the 2-sphere. Mathematika, 28(1), 1-35. https://doi.org/10.1112/S0025579300015321 A shorter companion journal article that previews some of the same results in a more compressed form. (londmathsoc.onlinelibrary.wiley.com)

Either reference is usually accepted; the book chapter [GS 1981a] is the most frequently quoted source when people assert that “every convex isohedron is Platonic, Catalan, or one of the three polar families.”

Thursday, July 17, 2025

To The Winner Go The Potatoes

In the philosophy of Humanitism, what does it mean that "to the winner go the potatoes"?

Short answer: In Machado de Assis’s satirical “philosophy” of Humanitism (Portuguese Humanitismo), the slogan “Ao vencido, ódio ou compaixão; ao vencedor, as batatas” (“To the vanquished, hatred or pity; to the victor, the potatoes”) sums up Quincas Borba’s claim that in any struggle for scarce resources the side that prevails rightfully takes the means of survival—the potatoes—while the losers’ fate doesn’t matter because individual lives are insignificant next to the abstract totality “Humanitas.” It’s a darkly comic reduction of grand metaphysics to crude material spoils, used by Machado to parody Social-Darwinist and positivist justifications for violence, competition, and social inequality. (Wikisource, Scribd, Wikipedia)


How the motto is introduced

Quincas Borba explains to Rubião: imagine a field with potatoes enough to nourish only one of two starving tribes; if they share, both die; if one destroys the other, the survivors gain strength to reach more food. Hence “peace is destruction; war is preservation… To the vanquished, hatred or compassion; to the victor, the potatoes.” (Wikisource, Scribd, TeX talk)

What it asserts within Humanitism

From this parable Borba infers that conflict which secures resources for the stronger side serves life and thus serves the universal substance Humanitas; individuals are mere “bubbles” in the boiling water—transient phenomena whose extinction is irrelevant to the underlying whole. The ethical upshot: material benefit to the winner trumps concern for the defeated. (Wikisource, Scribd, Wikipedia, biblioteca.pucrs.br)

Machado’s satirical target

Critics read Humanitism as Machado’s parody of nineteenth-century scientistic creeds—especially Social Darwinism and Comtean positivism—that dressed up the “law of the strongest” in lofty philosophical language. By pushing this logic to absurdity (“to the winner, the potatoes”), Machado exposes the inhuman, self-justifying moral calculus that can underwrite war, exploitation, or simple greed. (Wikipedia, TeX talk, lac.ox.ac.uk, Terra)

Later and idiomatic use

Because the scene is so memorable, “Ao vencedor, as batatas” has entered Brazilian Portuguese as an idiom roughly equivalent to “to the victor go the spoils,” invoked—often wryly—in contexts of competition, money, or power to mean that the winner walks away with the goods. (Wiktionary, Terra, VEJA, biblioteca.pucrs.br)


In sum: Within Humanitism the phrase literalizes a brutal survival calculus (winner eats; loser disappears) and, by exaggeration, lets Machado de Assis mock any philosophy that rationalizes inequality or violence as serving some higher good. (Wikisource, Scribd, Wikipedia)

Classics of Misogynistic Literature (o3)

classics of misogynistic literature from Hesiod to the modern day

Below is a chronological sampler of widely discussed texts that contain sustained or strikingly negative generalizations about women, enforce female subordination, eroticize domination, or otherwise figure prominently in scholarly conversations about misogyny—from Hesiod through the contemporary era. Inclusion here doesn’t mean every line of a work is hostile to women, nor that the author “hated women” in a simple biographical sense. Many are complex, ironic, parodic, or voiced through characters; some have been forcefully reinterpreted by later readers. I flag them because they’ve become touchstones in debates about literary misogyny.


How I’m Using “Misogynistic”

Working definition: A text (or major passage) that (1) depicts women as inherently inferior, corrupting, dangerous, or burdensome as a class; (2) normalizes or eroticizes domination/violence toward women; (3) persistently trivializes women’s subjectivity; or (4) has attracted a durable critical tradition labeling it misogynistic. Context matters: sometimes a character speaks misogyny; sometimes satire undercuts it; sometimes readers disagree. I note such complications briefly.


Antiquity (Greek & Roman)

  • Hesiod – Theogony & Works and Days (c. 700 BCE). The Pandora myth inaugurates “woman” as a divine punishment who unleashes woes on men; Works and Days amplifies economic/sexual anxieties about wives as consumers of male labor.
  • Semonides of Amorgos – “Types of Women” (7th c. BCE). Iambic catalogue reducing women to animal-nature stereotypes (sow, fox, dog, etc.), ending that the best woman barely exists; a paradigmatic ancient misogynist poem.
  • Euripides – Hippolytus (428 BCE; misogynist speeches). The title character’s tirades that “woman” is a plague are framed dramatically but have long been excerpted as antifeminist sententiae.
  • Aristophanic Tradition (esp. Lysistrata, Thesmophoriazusae, Assemblywomen, 5th–4th c. BCE). Comic gender inversions rely on stock jokes about women’s lust, secrecy, and domestic foibles; reception divided between reading as satire on men vs. recycling misogynist tropes.
  • Ovid – Ars Amatoria; parts of Amores & Metamorphoses (1 BCE–8 CE). Seduction “handbook” that encourages manipulative pursuit; the epic overflows with sexual coercion by gods and heroes—central to modern discussions of rape culture in classical myth.
  • Juvenal – Satire VI (early 2nd c. CE). A blistering, book-length diatribe cataloguing every imaginable female vice; the canonical Roman invective against women.
  • Martial – Selected Epigrams (1st c. CE). Recurrent mockery of wives, widows, and women’s bodies; brief but influential in shaping comic misogynist topoi.

Late Antiquity & Patristic / Early Christian Polemic

  • Tertullian – De Cultu Feminarum (“On the Apparel of Women,” c. 2nd–3rd c.). Casts all women as “the devil’s gateway,” morally dangerous because of Eve’s precedent; foundational for later clerical antifeminism.
  • Jerome – Adversus Jovinianum (c. 393 CE). In valorizing virginity, denigrates marriage and female sexuality; mined for antifeminist authorities in the Middle Ages.

Medieval Europe

  • Andreas Capellanus – De Amore (late 12th c.). Book III overturns earlier courtly love rules with sweeping denunciations of women; its sincerity debated but long quoted as antifeminist proof text.
  • Jean de Meun (continuation of Guillaume de Lorris) – Le Roman de la Rose (c. 1275). Allegorical encyclopedia that satirizes and slanders women’s morals, sexuality, & speech; the lightning rod that provoked Christine de Pizan’s famous defense of women.
  • “Antifeminist Authorities” Compilations (e.g., Lamentations of Matheolus, florilegia). Sourcebooks of clerical slurs against wives—visible inside Chaucer’s Wife of Bath’s Prologue, which quotes and parodies them.
  • Geoffrey Chaucer – Select Canterbury Tales Passages (late 14th c.). While Chaucer is often sympathetic, the Clerk’s Tale (extreme wifely obedience), Merchant’s Tale, and antifeminist citations in the Wife of Bath keep him central to the misogyny debate.
  • Heinrich Kramer & Jacob Sprenger – Malleus Maleficarum (1486). Witch-hunting manual asserting women’s inherent carnality and susceptibility to the devil; massively influential in gendered persecution (polemical prose, yet culturally “classic”).

Reformation & Early Modern

  • John Knox – The First Blast of the Trumpet Against the Monstrous Regiment of Women (1558). Polemic denying the legitimacy of female rulers (targeting Mary Tudor & Mary of Guise); seminal political misogyny.
  • Joseph Swetnam – The Arraignment of Lewd, Idle, Froward, and Unconstant Women (1615). Popular pamphlet vilifying women; sparked a lively counter-pamphlet tradition (“Swetnam controversy”).
  • William Shakespeare – The Taming of the Shrew (c. 1590–94). Comic “taming” of a rebellious woman; productions range from endorsing patriarchal submission to ironic critique—hence perpetual argument about misogyny.
  • Ben Jonson – Epicoene, or The Silent Woman (1609). Satire of noise, marriage, and gender performance that trades in stereotypes of the desirable “silent” wife.

17th–18th Centuries (Restoration, Enlightenment, Augustan)

  • Samuel Butler – Hudibras (1663–78, esp. anti-woman jibes). Burlesque poem including stock lampoons of female fickleness.
  • Jonathan Swift – “The Lady’s Dressing Room” (1732); “A Beautiful Young Nymph Going to Bed” (1731). Scatological exposure poems deflating idealized femininity; often cited as classic literary disgust at women’s bodies.
  • Alexander Pope – “Epistle II. To A Lady” (Moral Essays, 1735) & related verse. Brilliant couplets that reduce women to extremes (saint or devil, angel or ape); cornerstone of rhetorical misogyny discussions.
  • Jean-Jacques Rousseau – Émile (1762, Book V on Sophie). Prescribes an education making women pleasing, modest, subordinate to men’s moral development; philosophically influential gender hierarchy.

19th Century & Turn of the 20th

  • Arthur Schopenhauer – “On Women” (1851). Blanket claims of women’s intellectual & moral inferiority; heavily anthologized philosophical misogyny.
  • Leo Tolstoy – The Kreutzer Sonata (1889). Narrator’s fevered condemnation of female sexuality & marriage; critics debate whether Tolstoy endorses or exposes pathological jealousy, but it’s long read as misogynist.
  • August Strindberg – The Father (1887), Creditors (1888), Miss Julie (1888, contested). Ferocious gender battles; author’s public writings intensified charges of woman-hatred.
  • Otto Weininger – Sex and Character (1903). Pseudo-scientific classification ranking “Woman” as amorphous, amoral; hugely influential in European intellectual circles.

20th Century (Modernist to Late)

  • D. H. Lawrence – e.g., Women in Love (1920), Lady Chatterley’s Lover (1928). Erotic mysticism entwined with hierarchical gender myths; accused alternately of misogyny and of celebrating female desire—critical battleground.
  • Ernest Hemingway – recurrent portrayals (e.g., The Sun Also Rises, 1926). Critics have read his women as projections of male anxiety; debates continue.
  • Henry Miller – Tropic of Cancer (1934), Tropic of Capricorn (1939). Sexually explicit narratives objectifying women; landmark in censorship fights and misogyny critiques alike.
  • Norman Mailer – An American Dream (1965); essay “The Prisoner of Sex” (1971). Violent fantasy & anti-feminist polemic made Mailer emblematic of postwar macho misogyny.
  • Philip Roth – Portnoy’s Complaint (1969), later Sabbath’s Theater (1995). Male narrators whose obsessive sexual monologues slide into misogynist caricature; often defended as satire of their narrators.
  • John Updike – Rabbit novels (1960–2000). Chronic domestic realism that, to some readers, reduces women to foils for male spiritual angst; frequently cited in feminist critique.

Late 20th–21st Century / Contemporary

  • Bret Easton Ellis – American Psycho (1991). Graphic torture-murder of women amid consumer satire; debates over whether it indicts or reproduces misogynistic violence.
  • Michel Houellebecq – Whatever (1994), The Elementary Particles (1998), Submission (2015), others. Bleak sexual-market novels voiced through alienated men whose contempt for women (and men) has drawn persistent charges of misogyny (often broadened to misanthropy).
  • Neil Strauss – The Game (2005). Memoir/manual from pickup-artist culture that systematizes manipulative tactics toward women; culturally influential in contemporary misogynist subcultures (more pop-nonfiction than “literary classic,” but historically significant).
  • Online “Manosphere” / Incel Forums Anthologies (2000s–present). Not canonical literature, yet vital primary sources for current misogynist rhetoric; if you’re mapping the tradition forward, these digital texts extend long-standing tropes into networked culture.

Pair Them with Counter-Voices

Reading misogynistic texts alongside feminist or woman-authored responses sharpens critical insight. Classic pairings include:

  • Hesiod ↔ Sappho fragments (alternative female lyric voice).
  • Roman de la Rose ↔ Christine de Pizan, The Book of the City of Ladies (1405).
  • Swetnam ↔ Swetnam the Woman-Hater Arraigned by Women (1617).
  • Knox ↔ Queen Elizabeth I’s speeches; Mary Astell’s A Serious Proposal to the Ladies.
  • Pope/Swift ↔ Mary Wollstonecraft, A Vindication of the Rights of Woman (1792).
  • Schopenhauer/Weininger ↔ Simone de Beauvoir, The Second Sex (1949).
  • Mailer/Roth/Ellis ↔ contemporary feminist criticism (e.g., Kate Millett’s Sexual Politics, 1970).

Using the List

Study suggestions:

  1. Contextualize: What social, theological, or political anxieties does the text displace onto “women”?
  2. Voice vs. Author: Distinguish character speech, narrator stance, and authorial irony.
  3. Reception History: Track when and why readers have labeled the work misogynistic; judgments change.
  4. Counter-Readings: What resistant or feminist readings reappropriate the text?

Want More?

If you’d like:

  • Brief key passages to examine (with context & warnings),
  • A syllabus-style reading sequence,
  • Non-Western traditions (e.g., Confucian “admonitions to women,” certain legal-religious codes, or South Asian texts),
  • Or a focus on literature that critiques misogyny rather than embodies it,

just let me know and I can expand or create a printable reading list.