Book contents
- Frontmatter
- Dedication
- Contents
- Chapter 1 Introduction
- Chapter 2 Hybrid 𝒥-structures
- Chapter 3 Short tree strategy mice
- Chapter 4 A comparison theory of HOD mice
- Chapter 5 HOD mice revisited
- Chapter 6 The internal theory of LSA HOD mice
- Chapter 7 Analysis of HOD
- Chapter 8 Models of LSA as derived models
- Chapter 9 Condensing sets
- Chapter 10 Applications
- Chapter 11 A proof of square in LSA-small HOD mice
- Chapter 12 LSA from PFA
- References
- Index
Chapter 3 - Short tree strategy mice
Published online by Cambridge University Press: 07 June 2024
- Frontmatter
- Dedication
- Contents
- Chapter 1 Introduction
- Chapter 2 Hybrid 𝒥-structures
- Chapter 3 Short tree strategy mice
- Chapter 4 A comparison theory of HOD mice
- Chapter 5 HOD mice revisited
- Chapter 6 The internal theory of LSA HOD mice
- Chapter 7 Analysis of HOD
- Chapter 8 Models of LSA as derived models
- Chapter 9 Condensing sets
- Chapter 10 Applications
- Chapter 11 A proof of square in LSA-small HOD mice
- Chapter 12 LSA from PFA
- References
- Index
Summary
The main purpose of this chapter is to isolate the definition of short tree strategy mice. The main problem with defining this concept is the fact that it is possible that maximal iteration trees (which should not have branches indexed in the strategy predicate) may core down to short iteration trees (which must have branches indexed in the strategy predicate), thus causing indexing issues. To resolve this issue we will design an authentication procedure which will carefully choose iteration trees and index their branches. Thus, if some iteration tree doesn’t have a branch indexed in the strategy predicate then it is because the authentication procedure hasn’t yet found an authenticated branch, and therefore, such iteration trees cannot core down to an iteration tree whose branch is authenticated.
Keywords
- Type
- Chapter
- Information
- The Largest Suslin Axiom , pp. 61 - 96Publisher: Cambridge University PressPrint publication year: 2024