<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On the multi-interval Ulam-Renyi game: For 3 lies 4 intervals su ce</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ferdinando Cicalese</string-name>
          <email>ferdinando.cicalese@univr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Massimiliano Rossi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Verona</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>We study the problem of identifying an initially unknown m-bit number by using yes-no questions when up to a xed number e of the answers can be erroneous. In the variant we consider here questions are restricted to be the union of up to a xed number of intervals. For any e 1 let ke be the minimum k such that for all su ciently large m, there exists a strategy matching the information theoretic lower bound and only using k-interval questions. It is known that ke = O(e2). However, it has been conjectured that the ke = (e): This linearity conjecture is supported by the known results for small values of e. For e 2 we have ke = e: We extend these results to the case e = 3. We show k3 4 improving upon the previously known bound k3 10: In the Ulam-Renyi game with multi-interval questions, two players, called Questioner and Responder|for reasons which will become immediately clear| x three integer parameters: m 0; e 0 and k 1: Then, Responder chooses a number x from the set U = f0; 1; : : : ; 2m 1g; and keeps it secreto to Questioner. The task of Questioner is to identify the secret number x chosen by Responder asking k-interval queries. These are yes-no membership questions of the type \Does x belong to Q?" where Q is any subset of the search space which can be expressed as the union of k intervals. We identify a question with the subset Q: Therefore, the set of allowed questions is given by the family of sets:</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Introduction
T =
( k
[ fai; ai + 1; : : : ; big j 0
i=1
a1
b1
a2
b2
ak
bk &lt; 2m
)
Questioner's questions can refer to any subset, without the restriction to
kinterval queries. A fortiori, the lower bound holds for the multi-interval game
for any value of k. Strategies of size Nmin(2m; e); i.e., matching the information
theoretic lower bound, are called perfect.</p>
      <p>It is known that for any e 0 and up to nitely many exceptional values of m;
Questioner can infallibly discover Responder's secret number asking Nmin(2m; e)
questions. However, in general such perfect strategies rely on the availability of
arbitrary subset questions, i.e., any subset of the search space [20].</p>
      <p>When the cardinality of the search space is 2m the description of an
arbitrary subset query requires 2m bits. Moreover, in order to implement the known
strategies using Nmin(2m; e) queries, (e2m) bits are necessary to record the
intermediate states of the game (see the next section for the details). In contrast,
a k-interval-query can be expressed by simply providing the boundaries of the
k-intervals de ning the question, hence reducing the space requirements of the
strategy to only 2k m bits.</p>
      <p>On the basis of these considerations, we will focus on the following problem:
Main question. For given e 0, denote by ke the smallest integer k such that
for all su ciently large m Questioner has a perfect strategy in the multi-interval
game over the set of m-bit numbers only using k-interval queries. What is the
value of ke for e = 1; 2; : : : ?</p>
      <p>In [14] it was proved that for e = 2 for any m 0 (up to nitely many
exceptions) there exists a searching strategy for Questioner of size Nmin(m; e)
(hence perfect) only using 2-interval questions, and, conversely, perfect strategies
which only use 1-interval questions cannot generally exist. The case e = 1 is
analysed in [6] where it is shown that perfect strategies exists for e = 1 even
when only using 1-interval questions. However, comparison questions|of the
type \Is x q?"|are not powerful enough to provide perfect strategies for the
case e = 1 [19, 2].</p>
      <p>These results show that for e 2; the answer to our main question is ke = e:
In [6] one of the authors proved that for any e 1 there exists k = O(e2)
such that for all su ciently large m Questioner can identify an m-bit number
by using exactly N (2m; e) k-interval questions when Responder can lie at most
e times. In [6] also conjectured that ke = O(e) interval might su ce for any e
and all su ciently large m. We will refer to this as the linearity conjecture.
Our result. We focus on the case e = 3. We show that for any su ciently large
m, there exists a strategy to identify an initially unknown m-bit number when
up to 3 answers are lies, which matches the information theoretic lower bound
and only uses 4-interval queries. With respect to the main question above, we are
showing here that k3 4: This way we signi cantly improve the best previously
known bound of [6] yielding k3 10: We note that the main tool we employ
in the analysis (Lemma 2) naturally lends itself to a generalization to any xed
e: Ongoing research is about a stronger form of Theorem 1 that together with
such a generalized version of Lemma 2 might lead to the proof of the linearity
conjecture mentioned above, i.e., ke = O(e): Because of space constraints some
proofs are omitted. The complete version can be found at arXiv:1708.08738 [math.CO]
Related work. The Ulam-Renyi game [21, 18] has been extensively studied
in various contexts including error correction codes [1, 3, 10, 7], learning [4, 9,
16], many-valued logics [8, 10], wireless networks [13], psychophysics [12], and,
principally, sorting and searching in the presence of errors (for the large literature
on this topic, and the several variants studied, we refer the reader to the survey
papers [8, 17] and the book [5]).
2</p>
      <p>Basic facts
From now on we concentrate on the case e = 3 and the 4-interval questions.
Let Q be the subset de ning the question asked by Questioner. Let Q be the
complement of Q; i.e., Q = f0; 1; : : : ; 2m 1g n Q:</p>
      <p>If Responder answers yes to question Q, then we say that any number y 2 Q
satis es the answer and any y 2 Q falsi es the answer. If Responder answers no
to question Q, then we say that any number y 2 Q satis es the answer and any
y 2 Q falsi es the answer.</p>
      <p>
        For each y 2 U , we de ne (y) as the number of answers falsi ed by y,
truncated at 4: For each i = 0; 1; : : : ; 3; we will also write 1(i) to denote the
set of numbers falsifying exactly i of Responder's answers. And de ne 1(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) =
1(&gt; 3) to denote the set of numbers that as a result of the answers received
cannot be Responder's secret number.
      </p>
      <p>States and supports. A state is a map : U ! f0; 1; 2; 3; 4g. The type of is
the quadruple ( ) = (t0; t1; t2; t3) where ti = j 1(i)j for each i = 0; 1; 2; 3: The
support of is the set of all y 2 U such that (y) &lt; 4: A state is nal i its
support has cardinality at most one. The initial state is the function mapping
each element of U to 0: We formalise the dynamics of states as follows:
Answers and resulting states. Let be the current state with support
and Q be the new question asked by Questioner. Let b 2 fyes; nog be the answer
of Responder. De ne the answer function b : ! f0; 1g associated to question
Q by stipulating that b(y) = 0 if and only if y satis es answer b to question Q.
Then, the resulting state b is given by b(y) = maxf (y) + b(y); 4g:
More generally, starting from state after questions Q1; : : : ; Qt with answers
t
b1; : : : ; bt the resulting state is b1 b2 bt = maxf (y) + X bj (y); 4g:
j=1</p>
      <p>In particular, for being the initial state we have that the resulting state
after t questions is the truncated sum of the corresponding answer functions
associated to Responder's answers.</p>
      <p>Strategies. A strategy of size q is a complete binary tree of depth q where each
internal node maps to a question Q : The left and right branch stemming out
of map to the function answers yes and no associated to question Q : Each
leaf ` is associated to the state ` resulting from the sequence of questions and
answers associated to the nodes and branches on unique path from the roof to
`. In particular, if b1; : : : ; bq are the answers/branches leading to ` then we have
` = b1 bq as de ned above.</p>
      <p>The strategy is winning i for all leaves ` we have that ` is a nal state.</p>
      <p>We can also extend the above de nition to an arbitrary starting state. Given
a state , we say that a strategy S of size q is winning for if for any root to
leaf path in S with associated answers b1; : : : ; bq the state b1 bq is nal .</p>
      <p>We de ne the character of a state as ch( ) = minfq j wq( ) 2qg; where
wq( ) = Pj3=0 j 1(j)j P`3=0j q` is referred to as the qth volume of :</p>
      <p>We have that the lower bound Nmin(2m; e); mentioned in the introduction,
coincides with the character of the initial state ; such that 1(0) = U and
1(i) = ; for i = 1; 2; 3; 4 (see Proposition 1 below). Notice also that a state
has character 0 if and only if it is a nal state.</p>
      <p>For a state and a question Q let yes and no be the resulting states
according to whether Responder answers, respectively, yes or no, to question Q
in state . Then, from the de nition of the qth volume of a state, it follows that
for each q 1; we have wq( ) = wq 1( yes) + wq 1( no): A simple induction
argument gives the following lower bound [3].</p>
      <p>Proposition 1. Let be the state of the game. For any integers 0 q &lt; ch( )
and k 1; starting from state ; Questioner cannot determine Responder's secret
number asking only q many k-interval-queries.</p>
      <p>In order to nish the search within Nmin(2m; e) queries, Questioner has to
guarantee that each question asked induces a strict decrease of the character of
the state of the game. The following lemma provides a su cient condition for
obtaining such a strict decrease of the character.</p>
      <p>wq 1( no)j</p>
      <p>If jwq 1( yes)
Lemma 1. Let be the current state, with q = ch( ): Let D be Questioner's
question and yes and no be the resulting states according to whether Responder
answers, respectively, yes or no, to question D:</p>
      <p>1 then ch( yes) q 1 and ch( no) q 1:
A question which satis es the hypothesis of Lemma 1 will be called balanced. A
special case of balanced question is obtained when for a state the question D
satis es jD \ 1(i)j = j 1(i)j=2 for each i = 0; : : : ; e: In this case, we also call
the question an even splitting.</p>
      <p>Intervals and 4-interval-question. An interval in U is either the empty set
; or a set of consecutive elements [a; b] = fx 2 U ja x bg: The elements a; b
are called the boundaries of the interval.</p>
      <p>A 4-interval question (or simply a question) is any subset Q of U such that
Q = I1 [ I2 [ I3 [ I4 where for j = 1; 2; 3; 4; Ij is an interval in U .</p>
      <p>The type of Q, denoted by jQj, is the quadruple jQj = [a0Q; a1Q; a2Q; a3Q] where
for each i = 0; 1; 2; 3 , aiQ = jQ \ 1(i)j:</p>
      <p>Following [14] we visualize the search space as a necklace and restrict it to
the set of number which are candidate to be the secret number, i.e., we identify
U with its support = U \ Si3=0 1(i):</p>
      <p>For any non- nal state, i.e., j Si3=0 1(i)j &gt; 1, for each x 2 Si3=0 1(i)
we de ne the successor of x to be the number x + r mod 2m for the smallest
0 &lt; r &lt; 2m such that x + r mod 2m 2 Si3=0 1(i): In particular, for the initial
state 0 is the successor of 2m 1:</p>
      <p>For a; b 2 Si3=0 1(i) we say that there is an arc from a to b and denote it
by ha; bi if the following two conditions hold: (i) (x) = (a) for each element
x encountered when moving from a to b in U passing from one element to its
successor; (ii) (c) 6= (a) and (d) 6= (b) where a is the successor of c and d
is the successor of b. We say that arc ha; bi is on level (a) and call a and b the
left and right boundary of the arc.</p>
      <p>In words, an arc is a maximal sequence of consecutive elements lying on the
same level of the state .</p>
      <p>For the sake of de niteness, we allow an arc to be empty. Therefore, we can
associate to a state a smallest sequence L of (possibly empty) arcs a0; : : : ; ar 1
such that for each i the levels of arcs ai and ai+1 di er exactly by 1. Note that, by
requiring that the length r be minimum the sequence L is uniquely determined
up to circular permutation.</p>
      <p>For each i = 0; 1; : : : ; r; we say that arcs ai and a(i+1) mod r are adjacent (or
neighbours). We say that ai is a saddle if both adjacent arcs are on a lower level,
i.e., a(i 1) mod r; a(i+1) mod r 2 1(k 1) and ai 2 1(k) for some k</p>
      <p>We say that ai is a mode if both adjacent arcs are on a higher level, i.e.,
a(i 1) mod r; a(i+1) mod r 2 1(k + 1) and ai 2 1(k) for some k</p>
      <p>We say that ai is a step if for some k ai 2 1(k) and either a(i 1) mod r 2
1(k 1); a(i+1) mod r 2 1(k + 1) or a(i 1) mod r 2 1(k + 1); a(i+1) mod r 2
1(k 1).</p>
      <p>Based on the above notions, we now de ne a well-shaped state for e lies.
De nition 1. Let be a state and L be its associated list of arcs. Then,
well shaped i the following conditions hold:
is
{ for i = 0; : : : ; e 1, in L there are exactly (2i + 1) arcs lying on level i.
{ in L there are exactly e arcs lying on level e.</p>
      <p>
        It is not hard to see that for the case e = 3 under investigation, the only
two feasible well-shaped states are described as follow: 1(0) is an arc S in
; 1(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is the disjoint union of three arcs H,N and O in with N and O
adjacent to S; 1(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is the disjoint union of ve arcs A; B; C; L and M in
with B and C adjacent to H, L adjacent to N ; 1(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) is the disjoint union of
three arcs P; Q; R in with R and P adjacent to A.
      </p>
      <p>
        Starting with S and scanning U with positive orientation, we can list the
twelve arcs (restricted to ) in one of the following two possibilities:
1 = L2N 1S0O1M 2Q3B2H1C2R3A2P 3
2 = L2N 1S0O1B2H1C2Q3M 2R3A2P 3
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
where for an arc X the notation Xi denotes that X 1(i):
      </p>
      <p>
        Typical well-shaped states of type (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) are shown in Figures 1 and 2
respectively.
      </p>
      <p>Let be a state and ha; bi be a non-empty arc of :</p>
      <p>We say that a question Q splits the arc ha; bi if there exists an interval I in
Q that intersects ha; bi and contains exactly one of its boundaries a; b. In words,
there is an interval in the question such that some non-empty part of the arc
satis es a yes answer and some non-empty part of the arc satis es a no answer.</p>
      <p>If a question Q splits exactly one arc on level i of according to whether such
an arc is a mode, a saddle, or a step, we say that at level i the question Q (or,
equivalently, an interval of Q) is mode-splitting, saddle-splitting, step-splitting,
respectively.</p>
      <p>Let Q be a step-splitting question at level i. Let ha; bi be the arc at level i
which is split by an interval I of Q. Then, by de nition I contains exactly one
of the boundaries of the arc. If I contains the boundary of the arc that anks an
arc at level i + 1 we say that Q (or, equivalently, an interval of Q) is downward
step-splitting; if I contains the boundary of the arc that anks an arc at level
i 1 we say that Q (or, equivalently, an interval of Q) is upward step-splitting.</p>
      <p>We say that a question Q covers entirely the arc ha; bi if [a; b] is contained in
one of the intervals de ning Q.</p>
      <p>If a question Q covers entirely an arc on level i of according to whether such
an arc is a mode, a saddle, a step, we say that at level i the the question Q (or,
equivalently, an interval of Q) is mode-covering, saddle-covering, step covering,
respectively.</p>
      <p>Refer to Figure 3 for a pictorial representation of the interval types and
questions e ect on states.</p>
      <p>We will be interested in having questions that guarantee that both the two
possible states resulting from the answer yes and no are well-shaped. We will
de ne conditions on the intersection between the intervals de ning the question
and the arcs of a (well-shaped) state such that the both yes and no are well
shaped. It turns out that this condition can be de ned locally, level by level and
arc by arc.</p>
      <p>Lemma 2. Given a well-shaped state and a question Q, if the following
conditions are satis ed then both yes and no are well-shaped. For each i = 0; 1; 2
(a) At most one arc is splitted on level i
(b) Exactly one of the following holds
(i) at level i the question Q is mode-splitting;
(ii) at level i the question Q is upward step-splitting and mode-covering.
(iii) at level i the question Q is downward step-splitting and a mode is
completely uncovered|equivalently the complementary question Q is
modecovering at level i.
(iv) at level i the question Q is saddle-splitting and mode-covering and there
is also a mode completely uncovered|equivalently the complementary
question Q is mode-covering at level i.
(c) If besides the condition in (b) the question Q is also saddle-covering then Q
also covers a mode di erent from the one possibly used to satisfy (b).
3</p>
      <p>A key result on the existence of 4-interval questions
The strategy we propose is based on the approach of Spencer [20]. We are going
to recall the strategy presented in [20] and prove how to implement questions
in that strategy by means of 4-interval questions. The main technical tool will
be to show that we can de ne 4-interval balanced questions and also guarantee
that each intermediate state is well-shaped.</p>
      <p>In this section, we will characterise questions in terms of the ratio between
the components of the question and the components of the state they are applied.
We will show conditions for the existence of questions that can be implemented
using only 4-intervals and such that the resulting states are well-shaped whenever
the state they are applied to is well shaped.</p>
      <p>For each of them, we show how to select the exact amount of elements in the
query among the arcs representing the state. Then, we prove that no other cases
are allowed and nally we show that the well shapeness property of the state is
preserved in both states resulting from the answer to the query.</p>
      <p>Theorem 1. Let be a well-shaped state of type ( ) = (a0; b0; c0; d0). Let
a; b; c; d be integers such that:
0
a</p>
      <p>Then there exists a 4-interval question Q of type jQj = [a; b; c; d] that we
can ask in state and such that both the resulting "yes" and "no" states are
well-shaped.</p>
      <p>Proof. We rst show how to select the intervals of the question Q in order to
satisfy the desired type. We proceed level by level. For each i = 0; 1; 2; 3; we show
how to select up to 4 intervals that cover the required number of elements in
the rst i levels. For each level i = 0; 1; 2; 3 we record in a set E(i) the extremes
of the intervals selected so far that have a neighbour on the next level. We refer
to the elements in E(i) as the boundaries at level i. When processing the next
level, we try to select arc neighbouring the elements in E(i) since this means we
can cover elements at the new level without using additional intervals. Arguing
with respect to such boundaries, we show that the (sub)intervals selected at all
level can be merged into at most 4 intervals. Hence the resulting question Q is a
4-interval question. Finally, we will show that asking Q in both the resulting
states are well-shaped states.</p>
      <p>
        Recall the arc notation used in (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )-(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). In our construction, a special role
will be played by the arcs S; H; A, which are the greatest mode respectively of
level 0; 1 and 2, and the larger between their two neighbouring arcs at the level
immediately below. Therefore, let us denote by A(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) the larger arc between N
and O; we denote by A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) be the larger arc between B and C; and nally, we
denote by A(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) the larger arc between R and P .
      </p>
      <p>
        Moreover, we denote by s+ the boundary between S and A(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and with s
the other boundary of S.
      </p>
      <p>
        Analogously, we denote by h+ the boundary between H and A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and with
h the other boundary of H.
      </p>
      <p>
        We denote by a+ the boundary between A and A(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) and with a the other
boundary of A.
      </p>
      <p>Level 0 For any 0 &lt; a a0 there exists s 2 S such that denoting by S the sub-arc
of S between s and s+ we have that jS j = a and the boundary of S
includes s+: Then we have E (0) fs+g:
Therefore, with one interval I(0) = S we can accommodate the a elements
on level 0 and guarantee that this interval has an extreme at s+:</p>
      <p>Moreover, the interval I(0) on arc S is a mode-splitting interval.</p>
      <p>
        Level 1 By the assumption b d 21 b0e, and the de nition of A(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) it follows that
b jA(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )j + jHj. We now argue by cases
(a) b jHj. Then there exists h in H such that the sub-arc H H
between h and h+ satis es jH j = b and we can cover it with one
interval I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) with a boundary at h+.
(b) jHj &lt; b jHj + jA(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )j. Then, there exists x1 2 A(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) such that letting
X(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) be the sub-arc of A(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) between x1 and s+, we have jX(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )j + jHj = b
and we can cover these b elements extending the previously de ned I(0)
so that it covers X(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) too and having I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = H: In this case we have that
the boundaries of I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) are both h+ and h :
Summarising, we can cover the a elements on level 0 and the b elements on
level 1 with at most two intervals and guarantee that the boundaries of these
intervals include h+:
Moreover either the interval I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) on arc H is a mode-splitting interval or the
interval I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) covers entirely the mode H and the interval I(0) on arc A(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is
a step-splitting interval.
      </p>
      <p>
        Therefore the choice of the intervals so far satis es conditions in Lemma 2.
Level 2 Again we argue by cases
(a) c jAj: Then, there exists a in A such that letting A be the sub-arc
of A between a and a+ we have jA j = c and we can cover it with one
interval I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = A with one boundary in a+.
(b) jAj &lt; c jAj + jA(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )j Then, there exists x 2 A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) such that letting X(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
be the sub-arc of A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) between x and h+, we have jX(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )j + jAj = c and
we can cover these c elements extending the previously de ned I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) so
that it covers X(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) too and having I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = A: In this case we have that
the boundaries of I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) are both a+ and a :
(c) c &gt; jAj + jA(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )j: Let E denote the largest arc on level 2 not in fA(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ); Ag:
Then, by the de nition of A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) we have that jAj + jA(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )j + jEj jY j + jZj
where Y and Z denote the arcs on level 2 not in fA; A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ); Eg: This is
true because, at least one of the arcs Y; Z is not larger than A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and the
other one is not larger than E.
      </p>
      <p>
        Then, by the assumption c d c20 e it follows that jAj + jA(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )j + jEj c:
Let z be the boundary of A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) on the opposite side with respect to H.
Let e+ be the boundary between E and a neighbouring arc at level 3 or
at level 1 according to whether z is anking an arc at level 1 or an arc
at level 3|with reference to Figures 1, 2, is an easy direct inspection
shows that such a choice is always possible.
      </p>
      <p>
        Therefore, there exists e 2 E such that letting E be the sub-arc of E
between e and e+ we have jAj + jA(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )j + jE j = c and we can cover the
corresponding set of elements by: (i) extending I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) from h+ and have it
include the whole A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ); (ii) de ning I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = A; de ning a fourth interval
I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = E : Therefore, we have that the boundaries of I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) are both a+
and a and, in the case of a of type in Fig. 2, the boundary of I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
includes e+; and the boundary of I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is the boundary z of the arc A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
where this joins its adjacent arc at level 3.
      </p>
      <p>
        Summarising, we can cover the a elements on level 0 and the b elements
on level 1 and the c elements of level 2 with at most four intervals. More
precisely, if, proceeding as above we only use three intervals, I(0); I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ); I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        );
(and set I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = ;), we also guarantee that the boundaries of these intervals
include a+. On the other hand, if we use four intervals, (in particular, I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) 6=
;) we have that the boundaries of these intervals include a+; a and exactly
one between e+; z. Therefore fa+; a g E (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) fa+; a ; z; e+g. Notice that,
since there are only three arcs at level 3; in the case where I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) 6= ; either
there is an arc on level 3 with both ends neighbouring the boundaries in
E (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ); or each arc on level 3 has one end neighbouring a boundary in E (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ):
Moreover exactly one of the following cases holds (i) the interval I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) on
arc A is a mode-splitting interval; (ii) the interval I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) covers entirely the
mode H and the interval I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) on arc A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is a step-splitting interval; (iii)
the interval I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) covers the mode H, no interval intersects mode M and the
interval I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) on arc A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is saddle-splitting; (iv) the interval I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) covers the
mode H and the interval I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) covers the arc A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and the interval I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) on arc
E is downward step-splitting; (v) the interval I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) covers the mode H, the
interval I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) covers the arc A(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), hence it is saddle-covering, and the interval
I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) on arc E is upward step-splitting. .
      </p>
      <p>In all the above ve cases, the (partial) question built so far, with the
intervals de ned for levels 0, 1, 2, satisfy the conditions of Lemma 2.</p>
      <p>
        Level 3 Let us denote by W; U the two arcs at level 3 which are di erent from
A(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ); with jW j jU j: Then, by de nition we also have jA(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j jU j, hence
jA(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j + jW j 32 d0 d: We now argue by cases:
(a) d &lt; jA(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j. Then, there exists x3 in A(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) such that the sub-arc X(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
between a+ and x3 has cardinality jX(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j = d and can be covered by
extending I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) (which have a boundary at a+).
(b) jA(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j &lt; d jA(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j + jW j.
      </p>
      <p>
        We have two sub-cases:
{ I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = ;: I.e., for accommodating the question's type on Levels 0,1,2,
we have only used three intervals. By assumption, there exists a
subarc W of W such that jW j + jA(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j = d: Then, de ning I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) = W ;
and extending I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) (as in the previous case) so that it includes the
whole of A(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) guarantees that the four intervals I(0); : : : I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) de ne a
question of the desired type.
{ I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) 6= ;: Then, by the observations above, as a result of the
construction on level 2, either there is an arc on level 3 with both ends
at a boundary in E (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) or each arc on level 3 has a boundary in E (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ):
In the latter case, we can clearly extend the intervals I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) in
order to cover d elements on level 3. In the former case, let Z denote
the arc with both ends at boundaries in E (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ). If jZj d, we can
simply extend I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) towards the internal part of Z until they
include d elements of Z. If jZj &lt; d then we can extend I(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) so that
it includes Z and I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ):
      </p>
      <p>Since the way intervals are extended on level 3 do not a ect the arc covering
and splitting on the previous level, we have that in all cases the resulting
4interval question satis es the conditions of Lemma 2, which guarantees that
both resulting states are well-shaped. The proof is complete.</p>
      <p>Refer to Figures 1 and 2 for a pictorial representation of the 4-intervals question
construction in the proof of Theorem 1.
4</p>
      <p>The structure of perfect 4-interval strategies for 3 lies
We now show how to employ the result of the previous section to obtain a perfect
strategy for the Ulam-Renyi game with 3 lies, only using 4-interval questions. We
show that, for e = 3, by only relying on 4-interval questions, we can implement
the strategy of [20], that can be summarised as follows:</p>
      <p>[0; 0; 0; a3Q].
1. As long as the state satis es Pi2=0 j 1(i)j &gt; 1 ask a question Q of type
[a0Q; a1Q; a2Q; a3Q] where, for i = 0; 1; 2; aiQ 2 nb j 21(i)j c; d j 21(i)j eo with the
choice of whether to choose oor or ceiling alternating among those levels
where j 1(i)j is odd. The value of a3Q is computed based on the choices of
a0Q; a1 ; a2Q, in order to guarantee that the resulting question is balanced, i.e.,</p>
      <p>Q
a3Q = b 12 Pj2=0(j 1(j)j 2ajQ) qj c, where q + 1 is the character of ;
2. when the state satis es Pi2=0 j 1(i)j 1, ask a balanced question Q of type</p>
      <p>The condition in 2. can be easily guaranteed. In fact, the following
proposition shows that questions in point 2. are implementable by 4-interval questions,
preserving the well-shape of the state.</p>
      <p>
        Proposition 2. Let be a well-shaped state with 1(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) &gt; 0 and Pi2=0 j 1(i)j
1: Let ch( ) = q: Then, starting in state the Questioner can discover the
Respounder's secret number asking exactly q many 1-interval-queries.
      </p>
      <p>
        The main point in the argument of [20] is that, up to nitely many exceptions,
for all m = log jU j, the value a3Q de ned in 1. is feasible, in the sense that using
the above rules yields 0 a3Q j (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )j.
      </p>
      <p>
        We can now employ Theorem 1 to show that the above strategy can be
implemented by a 4-intervals-question. Let Q be the question de ned in 1: Let Q be
the complementary question, and [a0Q; a1Q; a2Q; a3Q] denote its type. For i = 0; 1; 2;
we have aiQ; aiQ d j 21(i)j e: Moreover, we have minfa3Q; a3Qg d 32 j 1(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )je:
Therefore, asking Q or Q according to whether a3Q a3Q guarantees that the
question satis es the hypothesis of Theorem 1 and then it can be implemented
as 4-interval question which also preserves the well-shape of the state.
      </p>
      <p>We can summarise our discussion in the following theorem.</p>
      <p>Theorem 2. For all su ciently large m in the game played over the search
space f0; : : : ; 2m 1g with 3 lies, there exists a perfect 4-intervals strategy. In
particular, the strategy uses at most Nmin(2m; 3) questions and all the states
of the game are well shaped, hence representable by exactly 12 log m bits (12
numbers from U ).</p>
      <p>Figures
L</p>
      <p>S</p>
      <p>0
1
2
3</p>
      <p>L</p>
      <p>N</p>
      <p>O</p>
      <p>H</p>
      <p>B</p>
      <p>S
yes</p>
      <p>
        I(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
Q?
      </p>
      <p>C</p>
      <p>
        M
Q
I(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
      <p>R
0
1
2
3</p>
      <p>C</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>R.</given-names>
            <surname>Ahlswede</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Deppe</surname>
          </string-name>
          , and
          <string-name>
            <given-names>U.</given-names>
            <surname>Vaccaro</surname>
          </string-name>
          ,
          <article-title>Two Batch Search with Lie Cost</article-title>
          .
          <source>IEEE Transaction on Information Theory</source>
          ,
          <volume>55</volume>
          (
          <issue>4</issue>
          ), pp.
          <volume>1433</volume>
          {
          <issue>1439</issue>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>V.</given-names>
            <surname>Auletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Negro</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Parlati.</surname>
          </string-name>
          <article-title>Some results on searching with lies</article-title>
          .
          <source>In: Proc. of 4th Italian Conf. on Theoretical Computer Science</source>
          , pp.
          <fpage>241737</fpage>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>E.R.</given-names>
            <surname>Berlekamp</surname>
          </string-name>
          .
          <article-title>Block coding for the binary symmetric channel with noiseless, delayless feedback</article-title>
          . In
          <string-name>
            <surname>Error-Correcting</surname>
            <given-names>Codes</given-names>
          </string-name>
          , Wiley, New York,
          <volume>61</volume>
          {
          <fpage>68</fpage>
          ,
          <year>1968</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>N.</given-names>
            <surname>Cesa-Bianchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Freund</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.P.</given-names>
            <surname>Helmbold</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Haussler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Schapire</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.K.</given-names>
            <surname>Warmuth</surname>
          </string-name>
          .
          <article-title>How to use expert advice</article-title>
          .
          <source>Journal of the ACM</source>
          ,
          <volume>44</volume>
          (
          <issue>3</issue>
          ), pp.
          <fpage>427</fpage>
          -
          <lpage>485</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          ,
          <string-name>
            <surname>Fault-Tolerant Search</surname>
            <given-names>Algorithms</given-names>
          </string-name>
          , Springer-Verlag,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          .
          <article-title>Perfect Strategies for the Ulam-Renyi Game with Multi-interval Questions</article-title>
          .
          <source>Theory of Computing Systems</source>
          ,
          <volume>54</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>578</fpage>
          -
          <lpage>594</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Vaccaro</surname>
          </string-name>
          .
          <article-title>Optimal strategies against a liar</article-title>
          .
          <source>TCS 230</source>
          ,
          <fpage>167</fpage>
          -
          <lpage>193</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mundici</surname>
          </string-name>
          , and
          <string-name>
            <given-names>U.</given-names>
            <surname>Vaccaro</surname>
          </string-name>
          ,
          <article-title>Rota-Metropolis cubic logic and UlamRenyi games</article-title>
          . In: Algebraic Combinatorics and Computer Science|A Tribute to Giancarlo Rota,
          <string-name>
            <given-names>H.</given-names>
            <surname>Crapo</surname>
          </string-name>
          , D. Senato (Eds.). Springer Italia, pp.
          <fpage>197</fpage>
          -
          <lpage>244</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Mundici</surname>
          </string-name>
          .
          <article-title>Learning and the Art of Fault-tolerant Guesswork</article-title>
          .
          <source>In: Adaptivity and Learning</source>
          , Springer,
          <fpage>115</fpage>
          -
          <lpage>140</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>F.</given-names>
            <surname>Cicalese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Mundici</surname>
          </string-name>
          .
          <article-title>Recent Developments of Feedback Coding and Its Relations with Many-Valued Logic</article-title>
          . In Proof, Computation and Agency,
          <string-name>
            <surname>J. van Benthem</surname>
          </string-name>
          et al.
          <source>(eds.)</source>
          . Springer{Verlag Synthese Library,
          <volume>352</volume>
          (
          <issue>3</issue>
          ) pp.
          <volume>115</volume>
          {
          <issue>131</issue>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. W. Guzicki, \
          <article-title>Ulam's searching game with two lies,"</article-title>
          <source>JCT-A</source>
          ,
          <volume>54</volume>
          , 1{
          <fpage>19</fpage>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. E. Kelareva,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mewing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wirth</surname>
          </string-name>
          .
          <article-title>Adaptive psychophysical procedures, loss functions, and entropy</article-title>
          . Attention, Perception, and Psychophysics,
          <volume>72</volume>
          ,
          <year>2003</year>
          {
          <volume>12</volume>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>W.</given-names>
            <surname>Kozma</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Lazos</surname>
          </string-name>
          .
          <article-title>Dealing with liars: Misbehavior identi cation via RenyiUlam games</article-title>
          .
          <source>In Proc. of the 5th Int. ICST Conf. on Security and Privacy in Communication Networks (SecureComm</source>
          <year>2009</year>
          ),
          <source>LNICST 19</source>
          , pp.
          <fpage>207</fpage>
          -
          <lpage>17227</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>D.</given-names>
            <surname>Mundici</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Trombetta</surname>
          </string-name>
          .
          <article-title>Optimal comparison strategies in Ulam's searching game with two errors</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>182</volume>
          pp.
          <fpage>217</fpage>
          -
          <lpage>232</lpage>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>A.</given-names>
            <surname>Negro</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Sereno</surname>
          </string-name>
          , \
          <article-title>Ulam's searching game with three lies,"</article-title>
          <source>Advances in Applied Mathematics</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>4</issue>
          , pp.
          <volume>404</volume>
          {
          <issue>428</issue>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>M.B. Or</surname>
            and
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Hassidim</surname>
          </string-name>
          .
          <article-title>The Bayesian Learner is Optimal for Noisy Binary Search (and Pretty Good for Quantum as Well)</article-title>
          .
          <source>In FOCS'08</source>
          ,
          <issue>221</issue>
          {
          <fpage>230</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>A.</given-names>
            <surname>Pelc</surname>
          </string-name>
          .
          <article-title>Searching games with errors|Fifty years of coping with liars</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>270</volume>
          (
          <issue>1-2</issue>
          ) pp.
          <fpage>71</fpage>
          -
          <lpage>109</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>A.</given-names>
            <surname>Renyi</surname>
          </string-name>
          .
          <article-title>On a problem of information theory</article-title>
          .
          <source>MTA Mat. Kut. Int. Kozl. 6B</source>
          , pp.
          <volume>505</volume>
          {
          <issue>516</issue>
          ,
          <year>1961</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>J.</given-names>
            <surname>Spencer</surname>
          </string-name>
          .
          <article-title>Guess a number with Lying</article-title>
          .
          <source>Math. Magazine</source>
          ,
          <volume>57</volume>
          pp.
          <volume>105</volume>
          {
          <issue>108</issue>
          ,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>J.</given-names>
            <surname>Spencer</surname>
          </string-name>
          .
          <article-title>Ulam's searching game with a xed number of lies</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>95</volume>
          pp.
          <volume>307</volume>
          {
          <issue>321</issue>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>S.M.</given-names>
            <surname>Ulam</surname>
          </string-name>
          .
          <article-title>Adventures of a Mathematician, Scribner's</article-title>
          , New York,
          <year>1976</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>