Home A class of extensions of Restricted (s, t)-Wythoff’s game
Article Open Access

A class of extensions of Restricted (s, t)-Wythoff’s game

  • Sanyang Liu and Haiyan Li EMAIL logo
Published/Copyright: March 20, 2017

Abstract

Restricted (s, t)-Wythoff’s game, introduced by Liu et al. in 2014, is an impartial combinatorial game. We define and solve a class of games obtained from Restricted (s, t)-Wythoff’s game by adjoining to it some subsets of its P-positions as additional moves. The results show that under certain conditions they are equivalent to one case in which only one P-position is adjoined as an additional move. Furthermore, two winning strategies of exponential and polynomial are provided for the games.

MSC 2010: 91A46

1 Introduction

All our games in this paper are 2-player impartial combinatorial games played on two piles of finitely many tokens. All the information about the games is available to both players; there is no difference between the moves allowed to each player, and there are no chance moves (such as dice); and the game must end at some position with a clear winner, i.e., without ties or draws. In normal play the player who makes the last move wins and the opponent loses.

In general, a position is called a P-position from which the Previous player can force a win, otherwise it is an N-position from which the Next player can win regardless of the opponent’s moves. The sets of all P-and N- positions of a game are denoted by 𝓟 and 𝓝, respectively. For a position u, by F(u) we denote the set of all its followers, i.e., all positions attainable by a legitimate move from u. Then it follows from the definition of P-and N-positions that the following relationship between 𝓟 and 𝓝 holds (it is well explained in [1, 2]):

uPF(u)N(stability property ofP-positions)uPuNF(u)P(absorbing property ofP-positions)

The sets of P-and N-positions of any game are uniquely determined by these two properties.

For example, Wythoff’s game over a hundred years old is exactly a famous impartial game, in which players can remove any positive number of tokens from a single pile, or the same number of tokens from both piles. In normal play, the player who is first unable to move loses. Various generalizations and results on this game were done by Berlekamp et al. [3], Duchěne and Gravier [4], Fraenkel [5, 6], Fraenkel and Borosh [7], Fraenkel and Zusman [8], Liu and Li [9], Li et al. [10].

We next describe two variants: (s, t)-Wythoff’s game and Restricted (s, t)-Wythoff’s game. By ℤ0 and ℤ+ we denote the set of nonnegative integers, and positive integers, respectively. Let ℤeven = {2n : n ∈ ℤ0}, ℤodd = {2n + 1:n ∈ ℤ0.

Consider two parameters s, t ∈ ℤ+ and two piles of finitely many tokens. In (s, t)-Wythoff’s game [6], a player may either remove any positive number of tokens from one pile or remove tokens from both piles, k > 0 from one pile and > 0 from the other, say ≥ k, subject to the constraint

0k<(s1)k+t. (1)

Throughout the paper, we consider the games in normal play, i.e., the player making the last move wins. Notice that the case s = t = 1 is Wythoff’s game, and the case s = 1, t ≥ 1 is Generalized Wythoff [5].

In Restricted (s, t)-Wythoff [9], two types of moves are as follows:

Type I Remove k tokens with 0 < k ∈ ℤeven from a single pile;

Type II Remove 0 < k ∈ ℤeven tokens from one pile and 0 < ∈ ℤeven from the other simultaneously, also constrained by the condition (1).

It was proved in [9] that the set of P-positions of Restricted (s, t)-Wythoff are given by four sequences of pairs of integers P={(An,Bn),(An,Bn+1),(An+1,Bn),(An+1,Bn+1)}n0 such that

An=mex{Ai,Ai+1,Bi,Bi+1:0i<n},Bn=sAn+(t+δt)n (2)

where mex S = min(ℤ0 \ S)= minimal excluded value of the set S, in particular, mex ∅ = 0; and δt = 1 if t is odd, δt = 0 if t is even.

For every n ≥ 0, we call the pair (An,Bn) a P-generator of P-positions, since it generates the set {(An,Bn),(An+1,Bn),(An,Bn+1),(An+1,Bn+1)} of P-positions.

In [11], Fraenkel et al. adjoined to Generalized Wythoff some appropriate subsets of its P-positions as additional moves, obtaining some interesting games. This idea of “adjoin some P-positions as moves” has also been exploited in [12] to examine (s, t)-Wythoff’s game, resulting in some generalizations of those in [11]. This observation enables us to examine Restricted (s, t)-Wythoff in this paper.

We define four games, Γ1, Γ2, Γ3, Γ4, generated from Restricted (s, t)-Wythoff by adjoining to it subsets of its P-generators nQi(An,Bn) as additional moves for i ∈ {1, 2, 3, 4 }. In addition to the moves of Type I and II, a player in Γi has a Type III move, i.e., remove An from one pile and Bn from the other for some nQi.

More specifically, we let Q1 = {1}, i.e., Γ1 is obtained from Restricted (s, t)-Wythoff by adjoining to it the P-generator (A1,B1)=(2,2s+t+δt) as the only Type III move. Put Q2 = ℤ+, thus in Γ2 all the nonzero P-generators of Restricted (s, t)-Wythoff are added as Type III moves. In Γ3, let Q3 = ℤ+\ {3+(t+δt)/2}. Finally, we define Γ4 with Q4 = ℤ+\ {2+(t+δt)/2}.

Each of our games is an infinite class of games, since they also depend on two parameters s and t as in Restricted (s, t)-Wythoff. But for every fixed s and t, each Γi is a single game.

In Section 2, some results useful throughout the paper are proved. Our main results are enunciated in Sections 3 and 4. Theorem 3.1 of Section 3 gives a recursive characterization of the P-positions of Γ1 for 2s + t + δt > 4, which provides an exponential time winning strategy for Γ1. Theorem 3.5 and Corollary 3.6, together with a special numeration system, provide a polynomial time winning strategy for Γ1.

In Section 4, Theorem 4.5 shows that for (s = 1, t ∈ {3, 4}) or (s = 2, t ≥ 1), Γ1 and Γ2 are equivalent; Theorem 4.6 shows that for s = 1 and t > 4, Γ1 and Γ3 are equivalent; and in Theorem 4.7 we prove that for s ≥ 3 and t + δt ≥ 2s − 2, Γ1 and Γ4 are equivalent. Final section provides the conclusions and some relevant open problems.

2 Preliminary

Let A=i=1AiandB=i=1Bi, where An and Bn are defined in Eq. (2). From Lemma 12 of [9], A′ ∩ B′ = ∅, A′ ∪ B′ = ℤeven\ {0}, and for every n > m ≥ 0, Bn+1>Bn>An>Am.

Lemma 2.1

For all n ∈ ℤ+, AnAn1{2,4},BnBn1 ∈ {2s + t +δt,\ 4s + t + δt}. Moreover, BnBn1=2s+t+δt if and only if AnAn1=2;BnBn1=4s+t+δt if and only if AnAn1=4.

Proof

Clearly 0<AnAn1Zeven. Now suppose AnAn16. Then we have An1<An1+2<An1+4<An=mex{Ai,Ai+1,Bi,Bi+1:0i<n}. Thus An1 +2 and An1 + 4 are in the set {Ai,Ai+1,Bi,Bi+1:0i<n}. Now A′ and B′ are disjoint, thus the only possibility is that both An1 + 2 and An1 + 4 are in B′, i.e., the gap between the adjacent elements in B′ can be 2, which contradicts the fact that BnBn1{2s+t+δt,4s+t+δt}. Hence, AnAn1{2,4}. The remaining part is directly from the definition of Bn and the above. □

Lemma 2.2

For every n > m ≥ 0, 2(nm) ≤ AnAm4(nm). In particular, letting m = 0, gives 2n An ≤4n.

Proof

By Lemma 2.1, 2(nm) ≤ AnAm=j=mn1(Aj+1Aj)4(nm).  □

Lemma 2.3

Let ϕn = An − 2n. For r ∈ ℤ0,

ϕj=2rBr<Aj<Br+1Br2(r1)2jBr+12(r+1). (3)

In particular, for fixed integer parameters s, t with 2s + t + δt > 4, then Aj=2j if and only if 2 ≤ 2j ≤ 2s + t + δt − 2, and Aj=2j+2 if and only if 2s + t + δt ≤ 2 j ≤ 4s + 2t + 2δt − 4.

Proof

Let S = {x : 0 < x≤ Aj , and x ∈ ℤeven. By ♯(S) we denote the number of elements of the set S. Put A=(AS)andB=(BS). Since A′ ∩ B′ = ∅, A′ ∪ B′ = ℤeven\ {0}, it is easy to derive that ♯ A′ + ♯ B′ = ♯(S) = Aj/2,A=j,and soB=Aj/2j.

Assume r is exactly the largest index such that Br<Aj. Now Bn is a strictly increasing sequence. Thus ♯B′ = r. Therefore,

ϕj=Aj2j=2B=2rBr<Aj<Br+1Br+22j+2rBr+12Br2(r1)2jBr+12(r+1).

From Eq. (2), A0=B0=0,A1=mex{0,1}=2,andB1=2s+t+δt. For 2s + t + δt > 4, we obtain A2=mex{0,1,2,3,2s+t+δt,2s+t+δt+1}=4,and thenB2=4s+2t+2δt. The rest of the proof is obtained by letting r = 0 and r = 1 in Eq. (3), respectively. □

Symmetry of our game rules implies that a game position (a, b) is identical to (b, a) . Clearly, the P-generators added to Restricted (s, t)-Wythoff alter the set of P-positions of Restricted (s, t)-Wythoff. But the set of P-positions of each Γi, i ∈ {1, 2, 3, 4 }, is still four sequences of pairs of integers. Denote by {(An, Bn), (An, Bn + 1), (An + 1, Bn), (An + 1, Bn + 1)}n≥ 0 the set of Γi, and for any n ∈ ℤ0, An, Bn ∈ ℤeven, AnAn+1 and AnBn. Like in Restricted (s, t)-Wythoff, the pair (An, Bn) is a P-generator of P-positions in each Γi.

Lemma 2.4

For every n > m ≥ 0, Bn+1 > Bn > An > Am.

Proof

First, by the notations above, AnAm and BnBm. Suppose An = Am, this implies BnBm, or else, (An, Bn) = (Am, Bm), impossible. So if Bn > Bm, then there is a move (An, Bn)→(Am, Bm) (Type I, and k = BnBm ∈ ℤeven), but it contradicts stability property of P-positions. Now suppose Bn < Bm, then (Am, Bm)→(An, Bn), resulting in another contradiction. Thus An > Am. Similarly, Bn > Bm.

We prove below An < Bn. Again by the notations, AnBn. If An = Bn for some n ∈ ℤ+, then we can move (An, Bn)→(0,0) (Type II, satisfies condition (1)), another contradiction. Therefore, Bn+1 > Bn > An > Am. □

Lemma 2.5

Put A=i=1AiandB=i=1Bi. Then AB = ∅, and AB = ℤeven\ {0}.

Proof

We first show AB = ∅. Suppose An = Bm for some m, n ∈ ℤ+. By Lemma 2.4, mn, and Bn > An = Bm > Am. Thus there is a move of Type I that (An, Bn)→(Am, Bm) with BnAm, which is impossible.

Clearly A0 = B0 = 0, and AB ⊆ ℤeven\ {0}. Suppose there exists u ∈ ℤeven\ {0} but uAB. Thus for every v ∈ ℤeven, (u,v)i=1(Ai,Bi), that is, (u, v) is an N-position. We show below that there exists some v0 ∈ ℤeven such that (u, v0) is not an N-position, by proving F(u, v0)∩ 𝓟 = ∅, i.e., no follower of (u, v0) is a P-position.

Let n0 be the largest index such that An0 < u. Then from (u, v) we can move to (Ai, Bi) only for some in0. In particular, let m0 = j be the largest index of Type III move (Aj,Bj) from (u, v) . More concretely,

m 0 = 1 for Γ 1 , max { i : A i u , } for Γ 2 , max { i : A i u , i 3 + ( t + δ t ) / 2 } for Γ 3 , max { i : A i u , i 2 + ( t + δ t ) / 2 } for Γ 4 .

Now Let D = max{Bi: in0} + 2, and v0 = D + su(t + 1). Note that v0 ∈ ℤeven. It is obvious that from (u, v0) we cannot lead to any position of the form (Ai + 1, Bi), (Ai, Bi + 1) or (Ai + 1, Bi + 1). So it suffices to prove that from (u, v0) none of Type I, II and III moves leads to (Ai, Bi) with in0.

For every in0, v0 > max{Bi: in0} ≥ Bi > Ai. Then v0 i=1n0 Ai i=1n0 Bi. We know u i=1n0 Ai i=1n0 Bi. Hence, we cannot move from (u, v0) to any (Ai, Bi) with in0 by a move of Type I.

For all in0, we have k = uAi > 0, = v0Bi = DBi + su(t + 1)> uAi = k, and k = DBi + (s − 1)u + Ai + sut > (s − 1)(uAi)+ t = (s − 1)k + t. Therefore, no move of Type II from (u, v0) leads to (Ai, Bi), in0.

Finally, we consider the move of Type III. By Lemma 2.2, An2n, and so

Bm0=sAm0+(t+δt)m0sAm0+(t+δt)AmO/2sAm0+tAm0su(t+1),

by virtue of (t+δt)/2tanduAm0. By the above, (Am0,Bm0) is the maximum Type III move from (u, v0). However, v0Bm0=D+su(t+1)Bm0D>Bi>Aifor everyin0. Therefore, no move of Type III from (u, v0) can lead to a P-position.

In conclusion, uAB, and then AB = ℤeven\ {0}. □

3 Two winning strategies for Γ1

Obviously, (0,0), (0,1), (1,0) and (1,1) are P-positions in Restricted (s, t)-Wythoff, and so are they in Γ1. Since now (A1,B1) is a legal move of Type III, the P-position (A1,B1) =(2,2s + t + δt) in Restricted (s, t)-Wythoff is no longer a P-position in Γ1, nor (A1+1,B1),(A1,B1+1)or(A1+1,B1+1). It is easily seen that this additional move for Restricted (s, t)-Wythoff alters the original P-positions.

Theorem 3.1

Given s, t ∈ ℤ+ with 2s + t + δt > 4. For Γ1, P=n=0{(An,Bn),(An,Bn+1),(An+1,Bn),(An+1,Bn+1)}, where for n ≥ 0,

An=mex{Ai,Ai+1,Bi,Bi+1:0i<n},Bn=(s1)An+(t+δt+4)n. (4)

Example 3.2

For s = 2, t ∈ {3, 4}, we display the first few P-generators of Γ1 in the table below, which show us how to determine 𝓟 by using Eq. (4).

Table 1

The first few P-generators of Γ1 for s = 2 and t ∈ {3, 4}.

n 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

An 0 2 4 6 8 12 14 16 18 22 24 26 28 32 34

Bn 0 10 20 30 40 52 62 72 82 94 104 114 124 136 146

Proof

Notice first that the condition 2s + t + δt > 4 implies that the case s = 1, t ∈ {1, 2 } is not covered. Thus we have either (s = 1, t > 2) or (s > 1, t ≥ 1).

For s = 1 and t > 2, the game was solved in [13], where Theorem 10 is precisely our assertion. But the structure of P-positions of the game is of algebraic form, which provides a poly-time winning strategy for our game. In addition, the methods of proof in [13] are totally different from those for the case s > 1 and t ≥ 1 in this paper.

For s > 1 and t ≥ 1, before we give the proof, some useful properties of the sequences An and Bn are required. Analysis similar to that in the proof of Lemmas 2.1 and 2.2 shows that for every n > m ≥ 0, we have (i)2(nm)AnAm4(nm),(ii)AnAn1{2,4},(iii)BnBn1{2s+t+δt+2,4s+t+δt}. Particularly, BnBn− 1 = 2s + t + δt + 2 if and only if AnAn − 1 = 2, BnBn − 1 = 4s + t + δt if and only if AnAn − 1 = 4.

Let A = i=1 Ai and B = i=1 Bi, then by Lemma 2.5 we have the fact that AB = ∅ and AB = ℤeven\ {0}.

Now it suffices to show two things:

  1. Every move from a position u ∈ 𝓟 cannot terminate in 𝓟.

  2. From every position v ∉ 𝓟, there exists alegal move vu ∈ 𝓟.

Proof of I

Let (x, y) with xy be a position in 𝓟. Assume that a move from (x, y) leads to another position in 𝓟. Since An, Bn ∈ ℤeven and so An + 1, Bn + 1 ∈ ℤodd, considering our game rules, we have eight possible moves for n > m ≥ 0:

(An,Bn)(Am,Bm),(An+1,Bn)(Am+1,Bm),(An,Bn+1)(Am,Bm+1),(An+1,Bn+1)(Am+1,Bm+1),(An,Bn)(Bm,Am),(An+1,Bn)(Bm+1,Am),(An,Bn+1)(Bm,Am+1),(An+1,Bn+1)(Bm+1,Am+1).

Now none of them could be a Type I move, since An and Bn are strictly increasing sequences.

They cannot be moves of Type II either. Indeed, for the first four cases, clearly n > m ≥ 0, and we have

k=(BnBm)(AnAm)=(s2)(AnAm)+(t+δt+4)(nm)(s1)(AnAm)+(4(nm)(AnAm))+t+δt(s1)k+t,

which contradicts Eq. (1). Next consider the last four cases. For every s > 1, t ∈ ℤ+ and every n ∈ ℤ0, we have Bn = (s − 1)An + (t + δt + 4)n > An. And by above, for every n > m ≥ 0, BnBms(AnAm)+2 > AnAm. It follows that BnAmBnBm>AnAmAnBm. Thus for these four cases, we have k=AnBmAnAm=k,=BnAmBnBm=,andkk(s1)k+t(s1)k+t, a contradiction.

It remains to consider the one and only Type III move (A1,B1) =(2,2s+ t +δt). For the first four cases, note that AnAm = 2 implies nm = 1. Then we get

B1=BnBm=(s1)(AnAm)+(t+δt+4)(nm)=2s+t+δt+2>B1,

a contradiction. For the remaining four cases, if AnBm = A1 =2 and BnAm = B1 = 2s+ t +δt. Now AnAm ≥ 2(nm) ≥ 2. Then A1+B1 = BnBm + AnAm = s(AnAm) + (t + δt + 4)(nm) ≥ 2s+ t +δt + 4, which is impossible. Hence, any one of the hypothetical moves above cannot be a Type III move, ending the proof of I.

Proof of II

Without loss of generality, let (x, y) with xy be a position not in 𝓟.

If x ∈ {0, 1}, then we move yδy, since clearly yδy is even. In what follows, suppose x ≥ 2. Now AB = ∅ and AB = ℤeven\ {0}. So x appears exactly once in exactly one of n=1 {An} ∪ n=1 {An + 1} and n=1 {Bn} ∪ n=1 {Bn + 1}. Thus we have one of the following two cases:

Case (i) x = Bn or Bn + 1, for some n ∈ ℤ+. Then yxBn > An + 1 ≥ An + δy, thus move yAn + δy since yAnδy is even.

Case (ii) x = An or An + 1, for some n ∈ ℤ+. In this case, we have y > Bn + 1 or xy < Bn. If y > Bn + 1, then move yBn + δy since 0 < yBnδy∈ ℤeven. If xy <Bn, we distinguish the following three subcases:

(ii. 1) y = Bn−1 or Bn−2. We know AnAn−1 ∈ {2, 4} for all n ∈ ℤ+. If AnAn−1 = 2, then BnBn−1 = 2s + t + δt + 2. We move (x, y)→(x−2, y−2stδt) by a move of Type III, with k = A1 = 2, = B1 = 2s + t + δt. Notice that x−2 = An−1 or An−1 + 1, and y−2stδt = Bn−1 or Bn−1 + 1. Hence, (x − 2, y − 2stδt)∈ 𝓟.

If AnAn−1 = 4, then BnBn−1 = 4s + t + δt. We move (x, y)→(x−4, y−4stδt + 2), Which is a legal move of Type II: First, it is easy to see that x−4 = An−1 or An−1 + 1, and y−4stδt + 2=Bn−1 or Bn−1 + 1. Thus (x−4, y−4stδt + 2)∈ 𝓟. Secondly, k = 4, = 4s + t + δt−2, and 0 < k = 4s + t + δt−2 < sk + t, which satisfies Eq. (1).

(ii.2) xy < sAn + t + δt. In this subcase, we move (x, y)→(xAn, δy)∈ 𝓟. This is a move of Type II, with k = An and = yδy. Indeed, both k and are even, then 0 < k = Anyδy = . And sAn + t + δt is even, which implies yδysAn + t + δt−2, and so k = yδyAn ≤ (s−1)An + t + δt−2 < (s−1)k + t.

(ii.3) sAn + t + δty < Bn−2. Put

m=y(s1)An2n+2δyt+δt+2,

where ⌊ x ⌋ denotes the largest integer ≤ x. Then move (x, y)→(xAn + Am, Bm + δy)∈ 𝓟 by a move of Type II, which is legal:

First, k = AnAm and = yBmδy are even. Next we have (a) k > 0, (b) k > 0, (c) < sk + t. Indeed,

  1. Since An ≥ 2n, we have y−(s−1)An−2n + 2−δy≥sAn + t + δt−(s−1)An−2n + 2>0, thereby m ≥ 0. On the other hand, y−(s−1)An−2n + 2−δy<Bn−(s−1)An−2n = (t + δt + 2)n, so 0 ≤ m < n. Thus k = AnAm > 0.

  2. By the definition of m, we have

    my(s1)An2n+2δyt+δt+2,

    so y ≥(t + δt + 2)m + (s−1)An + 2n−2 + δy. By (a) n>m and s>1, we get

    =yBmδy(t+δt+2)m+(s1)An+2n2(s1)Am(t+δt+4)m=(s1)(AnAm)+2(nm)2(s1)kk>0.
  3. By the definition of m, we have

    y(s1)An2n+2δyt+δt+21<m,

    i.e., yδy < (t + δt + 2)(m + 1) + (s−1)An + 2n−2. Further, note that both sides of this inequality are even, then yδy ≤ (t + δt + 2)(m + 1) + (s−1)An + 2n−4. It follows from 2(nm) ≤ (AnAm) that

    =yBmδy(t+δt+2)(m+1)+(s1)An+2n4(s1)Am(t+δt+4)m=(s1)(AnAm)+t+δt+2(nm)2s(AnAm)+t+δt2<sk+t.

The proof is completed. □

Theorem 3.1 provides a recursive winning strategy in terms of the mex function, which is exponential in the input size log xy of any game position (x, y)∈ ℤ0× ℤ0. For more theory of computing complexity of heap games, see [6]. Next, the central question we address here is whether our game has a better strategy, such as a polynomial time winning strategy.

We introduce a numeration system that turns out to be relevant to our game Γ1. For fixed integers s > 1 and t ≥1, let u−1 = 2/(s−1), u0 = 2, and put un = (s + ⌈ t/2⌉)un−1 + (s−1)un−2(n ≥ 1). Here and subsequently, ⌈ x ⌉ stands for the smallest integer ≥ x. Denote by 𝒰 the numeration system with bases u0, u1,… and digits di∈{0, 1,…, s + ⌈ t/2 ⌉}. Note that an integer such as un has two representations: un itself and (s + ⌈ t/2⌉)un−1 + (s−1)un−2. Since we would like to have uniqueness of representation, it is natural to stipulate that di = s + ⌈ t/2⌉ ⟹ di−1 < s−1 (i ≥ 1). Then we claim two facts:

  1. For every n ≥1, un∈ ℤeven, clearly by induction on n.

  2. Every decimal number N ∈ ℤeven has a unique representation R(N) over 𝒰. This is a special case of Theorem 3 in [14]. Note that the greedy algorithm of repeatedly dividing N or its remainder by the largest ui not exceeding this remainder gives the unique representation.

Those whose representations R(N) end in an even number of 0s are called vile numbers, and those whose representations R(N) end in an odd number of 0s are called dopey numbers (for an etymology of the terms vile, dopey, see [15]). In addition, by LR(N) we denote the “left shift” of R(N), i.e., LR(N) is obtained from R(N) by adjoining 0 to the right end of R(N).

Example 3.3

We consider Γ1 of Example 3.2, where s = 2, t∈ {3, 4}, and so ⌈ t/2⌉ = 2. Thus, u−1 = 2, u0 = 2, u1 = 10, u2 = 42, u3 = 178, …. The representations R(N) over 𝒰 of the first few numbers N∈ ℤeven appear in Table 2.

Table 2

Representations R(N) with N ∈ ℤeven over 𝒰.

42 10 2 N 42 10 2 N 178 42 10 2 N
1 2 1 2 0 62 2 3 4 122
2 4 1 2 1 64 2 4 0 124
3 6 1 2 2 66 3 0 0 126
4 8 1 2 3 68 3 0 1 128
1 0 10 1 2 4 70 3 0 2 130
1 1 12 1 3 0 72 3 0 3 132
1 2 14 1 3 1 74 3 0 4 134
1 3 16 1 3 2 76 3 1 0 136
1 4 18 1 3 3 78 3 1 1 138
2 0 20 1 3 4 80 3 1 2 140
2 1 22 1 4 0 82 3 1 3 142
2 2 24 2 0 0 84 3 1 4 144
2 3 26 2 0 1 86 3 2 0 146
2 4 28 2 0 2 88 3 2 1 148
3 0 30 2 0 3 90 3 2 2 150
3 1 32 2 0 4 92 3 2 3 152
3 2 34 2 1 0 94 3 2 4 154
3 3 36 2 1 1 96 3 3 0 156
3 4 38 2 1 2 98 3 3 1 158
4 0 40 2 1 3 100 3 3 2 160
1 0 0 42 2 1 4 102 3 3 3 162
1 0 1 44 2 2 0 104 3 3 4 164
1 0 2 46 2 2 1 106 3 4 0 166
1 0 3 48 2 2 2 108 4 0 0 168
1 0 4 50 2 2 3 110 4 0 1 170
1 1 0 52 2 2 4 112 4 0 2 172
1 1 1 54 2 3 0 114 4 0 3 174
1 1 2 56 2 3 1 116 4 0 4 176
1 1 3 58 2 3 2 118 1 0 0 0 178
1 1 4 60 2 3 3 120 1 0 0 1 180

A question we just might ask at this point is what the connection is between Tables 1 and 2. By scanning the first few entries of both tables, we may be tempted to conclude that all Ans in Table 1 are vile, also it seems that all Bns are dopey. Moreover, we consider a P-generator say (12, 52) in Γ1 with representations R(12, 52) = (11, 110). It is obvious that LR(12) = L(11) = 110 = R(52). Now consider an N-position (20, 84) in Γ1, whose representations are R(20, 84) = (20, 200), we also have LR(20) = R(84). Therefore, it appears that there is no causal relation between the facts that (x, y)∈ 𝓟 in Γ1 and the condition R(y) = LR(x). We next show how to determine P- positions of Γ1 via 𝒰.

Lemma 3.4

Let {Vm}m≥0 denote the set of all vile numbers in 𝒰 with 0 = V0 < V1 < V2< …, and put R(Dm) = LR(Vm) for all m. Then

Dm(s1)Vm=(2t/2+4)mforallm. (5)

Proof

Induction on m. Clearly for m = 0. Suppose Dm−(s−1)Vm = (2⌈ t/2⌉ + 4)m for arbitrary but fixed m. It suffices to prove that the assertion holds for m + 1. Let Vm = i=0ndiui. Since R(Dm) = LR(Vm), Dm = i=0ndjui+1. So we have

Dm(s1)Vm=(2t/2+4)m=i=0ndin(ui+1(s1)ui). (6)

Let q = s−2 and r = s + ⌈ t/2 ⌉. Then the linear recurrence of 𝒰 has the form un = run−1 + (q + 1)un−2 (n≥1), with the digits di∈{0, 1, …, r} such that di + 1 = rdiq(i≥0). We proceed by distinguish three cases, because the tail of R(Vm) must be one of the following three forms:

  1. The tail of R(Vm) has digits

    d2kd2k1d2k2d2d1d0=d2krqrqrq,

    for some k ∈ ℤ0, where d2k ∈ {0, 1,…, q} and d2k = qd2k+1 < r. Then it is not hard to see that Vm + 2 = (d2k+1)u2k + i=2k+1ndiui, and so Vm + 2 is vile. Thus Vm+1 = Vm + 2, since Vi is even for every i∈ ℤ0.

    un u2k u3 u2 u1 u0 N
    dn d2k r q r q Vm
    dn d2k+1 0 0 0 0 Vm+2

    Thus

    Dm+1(s1)Vm+1=(d2k+1)(u2k+1(s1)u2k)+i=2k+1ndi(ui+1(s1)ui)=u2k+1(s1)u2k+i=2kndi(ui+1(s1)ui). (7)

    On the other hand, by Eq. (6) and the recurrence run−1 + (q + 1)un−2 = un, we have

    (2t/2+4)m=q(u1(s1)u0)+r(u2(s1)u1)+q(u3(s1)u2)++q(u2k1(s1)u2k2)+r(u2k(s1)u2k1)+i=2kndi(ui+1(s1)ui)=u2k+1u1(s1)u2k+(s1)u0+i=2kndi(ui+1(s1)ui)=u2k+1(s1)u2k(2t/2+4)+i=2kndi(ui+1(s1)ui).

    Therefore, it follows from Eq. (7) that

    (2t/2+4)(m+1)=u2k+1(s1)u2k+i=2kndi(ui+1(s1)ui)=Dm+1(s1)Vm+1.
  2. The tail of R(Vm) has digits

    d2k+1d2kd2k1d2d1d0=d2k+1rqrqrqr,

    for some k ∈ ℤ0, where d2k+1 ∈ {0, 1,…, q} and d2k + 1 = qd2k+2 < r. Then Vm + 2 = (d2k+1 + 1)u2k+1 + i=2k+2ndiui, and so Vm + 2 is dopey. But Vm + 4 is vile, since R(Vm + 4) ends in 1. Thus Vm + 1 = Vm + 4 = u0 + (d2k + 1 + 1)u2k+1 + i=2k+2ndiui.

    un u2k+1 u2 u1 u0 N
    dn d2k+1 r q r Vm
    dn d2k+1+1 0 0 0 Vm+2
    dn d2k+1+1 0 0 1 Vm+4

    Hence,

    Dm+1(s1)Vm+1=(u1(s1)u0)+(d2k+1+1)(u2k+2(s1)u2k+1)+i=2k+2ndi(ui+1(s1)ui)=(2t/2+4)+u2k+2(s1)u2k+1+i=2k+1ndi(ui+1(s1)ui). (8)

    On the other hand, by Eq. (6),

    (2t/2+4)m=r(u1(s1)u0)+q(u2(s1)u1)++q(u2k(s1)u2k1)+r(u2k+1(s1)u2k)+i=2k+1ndi(ui+1(s1)ui)=u2k+2(s1)u2k+1+i=2k+1ndi(ui+1(s1)ui).

    The last equality follows from that summing the positive terms, adding and subtracting (s−1)u0, leads to u2k+2− 2(s−1), and that summing the negative terms, subtracting and adding (s−1)2u−1 = 2(s−1), leads to −(s − 1)u2k+1 + 2(s−1). Thus, by Eq. (8), D1m+1−(s−1)Vm+1 = (2⌈ t/2⌉ + 4)(m + 1), as required.

  3. The digit d0 satisfies q < d0 < r. By the definition of 𝒰, d1 < r, and so Vm+1 = Vm + 2. Thus it follows from Eq. (6) that

    Dm+1(s1)Vm+1=(d0+1)(u1(s1)u0)+i=1ndi(ui+1(s1)ui)=(2t/2+4)+i=0ndi(ui+1(s1)ui)=(2t/2+4)(m+1).

Finally, note that if Vm ends in an even number of 0s, it is of the form (i). The proof is completed. □

Theorem 3.5

For all n ∈ ℤ0, (Vn, Dn) = (An, Bn).

Proof

Obviously, (Dn, D0) = (A0, B0) = (0, 0). For n ≥ 1, we have two facts:

  1. An, Bn, Vn, Dn∈ ℤeven;

  2. For all t∈ ℤ+, t + δt = 2⌈ t/2⌉.

By Eqs. (4) and (5), together with Fact (ii), Bn and Dn have the same formation law. It remains only to show that An and Vn have the same inductive formation rule, i.e., Vn = mex{Vi, Vi + 1, Di, Di + 1 : 0 ≤ i < n}.

Now for every n ≥ 1, Dn is dopey, since Vn is vile and R(Dn) = LR(Vn). By Fact (i), Dn>Vn + 1 > Vn. It follows that i=1Viandi=1Di are complementary with respect to ℤeven(>0), since every positive integer has precisely one representation in 𝒰1, either vile as Vns do or dopey as the Dns do. Let S = {Vi, Vi + 1, Di, Di + 1 : 0 ≤ i < n}. Suppose mex S = Dj for some jn. This implies that Vj ∈ S on account of Vj < Dj, and then j < n, a contradiction. Therefore, mex S = Vn, the assertion follows. □

Corollary 3.6

Given a position (x, y)∈ Γ1 with s > 1. (x, y) is a P-position if and only if there exists some n ∈ ℤ0 such that (⌊ x/2⌋, ⌊ y/2⌋) = (Vn, Dn).

Proof

If (x, y) is a P-position of Γ1 with its P-generator (⌊ x/2 ⌋, ⌊ y/2 ⌋) = (An, Bn) for some n ∈ ℤ 0, then by Theorem 3.5, (An, Bn) = (Vn, Dn), and vice versa. □

Given any game position (x, y) with 0 < xy, compute R(x) using the greedy algorithm mentioned above. If R(x) ends in an odd number of 0s, then x = Bn for some n ∈ ℤ+. Then we move yAn, where R(Bn) = LR(An). If R(x) ends in an even number of 0s, then x = An for some n ∈ ℤ+. The relative size of y and Bn can also be tested, since R(Bn) = LR(An). Thus the complexity of this computation, up to a multiplication constant, is that of computing R(x), which is linear in log x. Hence, this winning strategy bases on 𝒰 is polynomial in the input size log x.

4 Analyzing the equivalences

Lemma 4.1

Let An and Bn be determined by Eq. (4). Then for every n > m ≥ 0, let AnAm = 2(nm) + 2r. If r ≥ 1, then AnAm≥(r−1)(2s + t + δt + 2) + 4.

Proof

Let S = {x : Am < xAn, x ∈ ℤeven}. As in the proof of Lemma 2.3, ♯(S) = (AnAm)/2, ♯A = ♯(AS) = nm, and ♯ B = ♯(BS) = ♯(S)− ♯ A = r.

By Bj+1, Bj+2, …, Bj+r we denote the r elements of BS. From the properties of An and Bn in the proof of Theorem 3.1, we have Am + 2 ≤ Bj+1 < Bj+2 < ⋯ < Bj+rAn−2. Since also Bj+1Bj ∈ {2s + t + δt + 2, 4s + t + δt}, thus AnAmBj+rBj+1+4=4+i=j+1j+r1(Bi+1Bi)(r1)(2s+t+δt+2)+4.  □

Lemma 4.2

Given two parameters s, t ∈ ℤ+. For every n > m > 0, there is no i ∈ ℤ+ such that Ai=AnBmandBi=BnAm, where AiandBi are determined in Eq. (2), Ai and Bi are determined in Eq. (4).

Proof

Suppose that there exits some i0 ∈ ℤ+ such that Ai0=AnBmandBi0=BnAm. Write AnAm = 2(nm) + 2r. According to the proof of Theorem 3.1, we have 2(nm) ≤ AnAm ≤ 4(nm) for every n > m ≥0, thus r ≥ 0.

If r = 0. From Lemma 2.2, for all nZ0,2nAn4n. Thus 2(nm) = AnAm > AnBm = Ai0 ≥ 2i0, i.e., nm > i0. Hence,

Bi0=BnAm>BnBm>(s1)Ai0+(t+δt+4)i0=Bi0+4i0Ai0Bi0,

a contradiction.

If r ≥ 1, then 2(nm) + 2r = AnAm>AnBm = Ai0. More accurately, 2(nm) ≥ Ai0 −2r + 2. By Lemma 4.1, we have AnAm≥(r−1)(2s + t + δt + 2) + 4 > (r−1)(t+δt + 4). Then

Bi0+Ai0=BnBm+AnAm=s(AnAm)+(t+δt+4)(nm)s(Ai0+BmAm)+(t+δt+4)(Ai0/2r+1)=(s+1)Ai0+Ai0+s(BmAm)+(t+δt)Ai0/2(r1)(t+δt+4)(s+1)Ai0+(t+δt)i0+AnAm(r1)(t+δt+4)>(s+1)Ai0+(t+δt)i0=Bi0+AiO,

another contradiction. □

Lemma 4.3

For s > 1 and t ≥ 1. Suppose that (An, Bn)→(Am, Bm) with Aj=AnAmandBj=BnBm for some n > m ≥ 0. Then

Aj2(j+1+2s2t+δt) (9)

Proof

Let S = {x : Am < xAn, and x ∈ ℤeven}. As the above, ♯ (S) = Aj /2, ♯A = ♯(AS) = nm, ♯B = ♯(BS) = ♯(S)− ♯A. Then 2(nm) = Aj −2 ♯B. The minimum value of 2(nm) is reached at the maximum value of ♯B, that is, when there is a smallest distance of 2s + t + δt+2 between consecutive elements of BS.

Since Aj is even, and also 2s+ t+δt+2 is even, dividing Aj by 2s+t+δt+2 gives Aj = (2s+t+δt+2)q + 2r, r ∈ {1, 2, 3,…, s+(t + δt)/2}. Note that for r ≥ 2, there may be an additional element in BS. Thus

2(nm)(2s+t+δt)q+2rifr{0,1},2(r1)ifr{3,4,,s+(t+δt)/2}.

Now

Bj=BnBm=i=mn1(Bi+1Bi)(2s+t+δt+2)(nm).

If r ∈ {0, 1},

Bj(2s+t+δt+2)(nm)(s+(t+δt)/2+1)((2s+t+δt)q+2r)=(s+(t+δt)/2)Aj+2r(s+(t+δt)/2)Aj.

If r ∈ {2, 3,⋯, s +(t+δt)/2},

Bj(2s+t+δt+2)(nm)(s+(t+δt)/2)(2s+t+δt)q+(2s+t+δt+2)(r1)=(s+(t+δt)/2)Aj+2r(2s+t+δt+2)(s+(t+δt)/2)Aj+2(2s+t+δt).

In either case, the following inequality holds:

sAj+(t+δt)j=Bj(s+(t+δt)/2)Aj+2(2s+t+δt)

Therefore,

Aj2(j+1+2s2t+δt).

 □

Lemma 4.4

Given s, t ∈ ℤ+. For 2s + t +δt > 4 and t +δt ≥ 2s−2, suppose that there is a move (An, Bn)→ (Am, Bm) with Aj = AnAm and Bj = BnBm for some n > m ≥ 0. Then

  1. If s = 1 and t ∈ {3, 4}, this is impossible for any j ≥ 1. If s = 1 and t > 4, the only possibility is j = 3 + (t + δt)/2.

  2. If s = 2 and t ≥ 1, this is impossible for any j ≥ 1.

  3. If s ≥ 3 and t + δt ≥ 2s−2, the only possibility is j = 2 +(t+δt)/2.

Proof

Again let S = {x : Am < xAn, x ∈ ℤeven}. From the proof of Lemma 4.3 we have 2(nm) = Aj −2♯B. By Lemma 2.2, Aj ≥ 2j for all j ∈ ℤ+. Thus Eq. (9) implies that there are three possibilities: (a) Aj = 2j, (b) Aj = 2j+2 and (c) Aj = 2j+4.

Case (a) Aj = 2j. By definition, Bj = (2s + t +δt)j. By Lemma 2.3, Aj = 2j means that 2 ≤ AnAm = 2j ≤ 2s + t +δt−2.

There must be up to one BiS, i.e., ♯B∈{0, 1}. For if there are more than two elements in BS, then there is a gap less than 2s + t +δt−2 between the adjacent elements of BS, but it contradicts with the fact that Bi+1Bi ∈ {2s + t +δt+2, 4s+ t +δt}.

So suppose ♯B = 0. Then nm = Aj /2 = j, this implies that AiAi−1 = 2 for all m < in. Accordingly, BiBi−1 = 2s + t +δt+2 for m < in. Thus BnBm = (2s + t +δt+2)(nm)>(2s + t +δt) j = Bj , This contradicts our assumption.

Now suppose ♯B = 1. Then nm = ( Aj −2)/2 = j−1. Let Bi0 denote the only element of BS with Aλ < Bi0 < Aλ+1, where m<λ<n.

,Am,,Aλ2(λm),Bi04,Aλ+1,,An,2(nλ1)

Therefore,

BnBm=mi<λ(Bi+1Bi)+(Bλ+1Bλ)+λ<in1(Bi+1Bi)=(2s+t+δt+2)(λm)+(4s+t+δt)+(2s+t+δt+2)(nλ1)=(2s+t+δt+2)(nm1)+4s+t+δt=(2s+t+δt+2)(j2)+4s+t+δt=(2s+t+δt)j+2j(t+δt+4)=Bj+(2j(t+δt+4)).

If s ∈ {1, 2}, then 2j−(t + δt+4) ≤ 2s + t +δt−2−(t + δt+4) = 2s−6 < 0. Thus for any t ∈ ℤ+, Bj = BnBm is impossible.

If s ≥ 3, then Bj = BnBm if and only if 2 ≤ 2j = t + δt+4 ≤ 2s + t +δt−2, which is true for any t ∈ ℤ+. Thus the only possibility is j = (t + δt)/2+2.

Case (b) Aj = 2j+2. In this case, Bj = s Aj +(t + δt)j = (2s + t +δt)j+2s. By Lemma 2.3, Aj = 2j + 2 means that

2s+t+δtAnAm2=2j4s+2t+2δt4. (10)

We claim that ♯B∈{1, 2}. Indeed, if ♯B = 0, then nm = Aj /2 = j+1. By the same argument as for the case (a), we get Bj = BnBm = (2s + t +δt+2)(nm) = (2s + t +δt+2)(j+1)> Bj , a contradiction. If ♯B ≥ 3, then there is a gap less than (AnAm)max/2 between the neighbouring elements of BS. But (AnAm)/2 ≤ 2s + t +δt−1, so this also cannot happen by reason of Bi+1Bi ∈{2s + t +δt+2, 4s+ t +δt}. We first suppose ♯B = 1. Then nm = ( Aj - 2)/2 = j. In the same manner of case (a), we can see that

BnBm=(2s+t+δt+2)(nm1)+4s+t+δt=(2s+t+δt+2)(j1)+4s+t+δt=(2s+t+δt+2)j+2s+2j2=Bj+2j2Bj+(2s+t+δt2)>Bj,

a contradiction.

Next suppose ♯B = 2. Then nm = ( Aj −4)/2 = j−1. Let Bj0, Bi0+1BS with Aλ0 < Bj0 < Aλ0+1, and Aλ1 < Bi0+1 < Aλ1+1, where m < λ0 < λ1 < n.

,Am,,Aλ02(λ0m),Bi04,Aλ0+1,,Aλ12(λ1λ01),Bi0+14,Aλ1+1,,An2(nλ11),

Similarly, we have

BnBm=(2s+t+δt+2)(nm2)+2(4s+t+δt)=(2s+t+δt+2)(j3)+2(4s+t+δt)=(2s+t+δt)j+2s+2j(t+δt+6)=Bj+2j(t+δt+6). (11)

It is worth to mention that Bj0Am + 2 and Bi0 + 1 ≤ An − 2. Consequently, 2j + 2 = Aj = AnAmBi0 + 1 − Bi0+4 ≥ 2s+ t + δt + 6. It follows Eq. (10) that

2s+t+δt+42j4s+2t+2δt4. (12)

If s = 1, t ∈{3, 4}, there is no such j satisfying Eq. (12).

If s = 1, t > 4, by Eq. (11), BnBm = Bj if and only if j = (t + δt)/2+3, which satisfies Eq. (12).

If s ≥ 2, then 2j ≥ 2s + t + δt + 4 ≥ t + δt + 8 > t + δt + 6, thus Bj = BnBm is impossible.

Case (c) Aj = 2j + 4. On account of Eq. (9) this case can happen only when t + δt = 2s − 2. Thus we have Bj = sA Aj +(t + δt)j = (4s − 2)j + 4s. And the condition 2s + t + δt = 4s− 2 > 4 implies s ≥ 2. We below consider s = 2 and s ≥ 3, respectively.

(c-i) s = 2 (and also t + δt = 2). Now Bj = 6j + 8. By Lemma 2.3, Aj = 2j + 4 implies that B22AnAm4=2jB36. Recall that A0=B0=0,A1=mex{0,1}=2,andB1=2s+t+δt=6. Thereby, A2=mex{0,1,2,3,6,7}=4and thenB2=4s+2(t+δt)=12.AlsoA3=mex{0,1,2,3,4,5,6,7,12,13}=8, and so B3=22. Thus 14 ≤ AnAm ≤ 24, and 5 ≤ j ≤ 8. In this case, we also have the fact that Bi+1Bi ∈ {2s + t + δt+2, 4s + t + δt}={8, 10}.

Then we claim that ♯B ∈ {1, 2, 3}. Indeed, if ♯B = 0, then nm = Aj /2 = j + 2. By the same argument as for the cases (a) and (b), we have Bj = BnBm = 8(nm) = 8(j + 2)> Bj , a contradiction. If ♯B ≥ 4, then there is a gap less than (AnAm)/3 ≤ 8 between adjacent elements of BS, which is impossible.

Now if ♯B = 1, then nm = ( Aj − 2)/2=j + 1. As in the proof of case (a), BnBm = 8(nm − 1)+10 = 8j + 10 > Bj , contradicting the assumption.

If ♯B = 2, we know nm = ( Aj − 4)/2 = j. Similarly, BnBm = 8(nm − 2) + 20 = 8(j − 2)+20 > Bj ,a contradiction.

If ♯B = 3, then nm = ( Aj − 6)/2 = j − 1. Assume the three elements in BS are Bj0, Bi0 + 1, Bi0 + 2 for some i0 ∈ ℤ+, then we have Bi0Am + 2 and Bi0 + 2An− 2, thus Aj = AnAmBi0 + 2Bj0 + 4 ≥ 20, i.e., j ≥ 8. In the same manner we can see that

BnBm=8(nm3)+30=8(j4)+30>6j+8=Bj

since j ≥ 8 (by above 5 ≤ j ≤ 8, the only possibility j fact is j =8), giving a contradiction.

(c-ii) s ≥ 3. Then we have 2s + t +δt = 4s − 2 ≥ 10. Recall that A0=B0=0,A1=2,andB1=2s+t+δt10. So A2=mex{0,1,2,3,B1,B1+1}=4,B2=4s+2(t+δt)=8s4. Also A3=mex{0,1,2,3,4,5,B1,B1+1,B2,B2+1}=6, and so B3=12s6. Lemma 9 now shows that 8s− 2 = B2+2AnAm=AjB32=12s8, i.e., 4s − 3 ≤ j ≤ 6s−6.

Now we claim that ♯B ∈ {1, 2, 3}. Otherwise, if ♯B = 0, then nm = Aj /2 = j + 2, we have Bj = (2s+ t + δt + 2)(nm) = (4s − 2)(j + 2) > (4s − 2)j + 4s = Bj , a contradiction. If ♯B ≥ 4, there is a gap less than (AnAm)/3 < 4s between neighbouring elements of BS, but Bi+1Bi ∈ {2s + t + δt+2, 4s + t +δt}= {4s, 6s − 2}, giving a contradiction.

First suppose ♯B = 1. As the above, we get BnBm = 4s(nm − 1) + (6s − 2) = 4sj + 6s − 2= Bj + 2j + 2s − 2 > Bj by reason of j ≥ 4s − 3 and s ≥ 3, a contradiction.

Next suppose ♯B = 2. Similarly, BnBm = 4s(nm − 2) + 2(6s − 2) = 4s(j − 2) + 12s − 4 = Bj + 2j − 4 > Bj , a contradiction.

Finally suppose ♯B = 3. Analogously, we have BnBm = 4s(nm − 3) + 3(6s − 2) = 4s(j − 4) + 18s − 6 = Bj + 2j − 2s − 6 > Bj since j ≥ 4s − 3 and s ≥ 3.

Therefore, if Aj = 2j + 4, for any s ≥ 2 and t ≥ 1 with t + δt = 2s − 2, the hypothesis Bj = BnBm is impossible. □

Given two games, they have the same game positions but with possibly different move rules. We call them equivalent if their P-positions are the same. Two equivalent games certainly have also the same N-positions, as well as winning strategy.

Theorem 4.5

For (s = 1 and t ∈{3, 4}) or (s=2 and t ≥ 1), Γ1 and Γ2 are equivalent.

Proof

Recall that Γ2 can be viewed as Γ1 to which the moves i2(Ai,Bi) have been adjoined. By Lemmas 4.2 and 4.4, for (s =1 and t ∈{3, 4}) or (s = 2 and t ≥ 1), there is no i ≥ 2 such that (Ai,Bi)=(AnAm,BnBm) or (AnBm, BnAm) for any n > m ≥ 0. In other words, adding i2(Ai,Bi) to Γ1 makes the set of its P- positions 𝓟 unaltered. Thus Γ1 and Γ2 have the same set of P-positions. □

Theorem 4.6

For s = 1 and t ≥ 4, Γ1 and Γ3 are equivalent.

Proof

Γ3 can be viewed as Γ1 to which infinitely many of its nonzero P-positions are adjoined, but except one, (A3+(t+δt)/2,B3+(t+δt)/2). By Lemmas 4.2 and 4.4, for s = 1 and t ≥ 4, there is only one j = 3+(t + δt)/2 such that (Ai,Bi)=(AnAm,BnBm)or(AnBm,BnAm) for some n > m ≥ 0. Thus those additional moves to Γ1 do not change the set of its P-positions 𝓟, that is, Γ1 and Γ3 have the same set of P-positions. □

Theorem 4.7

For s ≥ 3 and t + δt ≥ 2s − 2, Γ1 and Γ4 are equivalent.

Proof

Similarly to Γ3, Γ4 is obtained from Γ1 by adjoining to it infinitely many of its nonzero P-positions, but except (A2+(t+δt)/2,B2+(t+δt)/2). Again by Lemmas 4.2 and 4.4, for s ≥ 3 and t + δt ≥ 2s − 2, there is only one j = 2+(t + δt)/2 such that (Ai,Bi)=(AnAm,BnBm)or(AnBm,BnAm) for some n > m ≥ 0. Thus the additional moves to Γ1 do not change the set of its P-positions 𝓟. Therefore, Γ1 and Γ4 are equivalent. □

5 Conclusions

Both exponential and polynomial time winning strategies for Γ1 are obtained when 2s+ t + δt > 4, and under certain conditions, Γ2, Γ3, Γ4 have the same winning strategy with Γ1. However, the special case s = 1 and t ∈{1, 2} is not covered, in which the P-positions are actually too irregular to be described explicitly. Similarly, the special case s = t = 1 is not involved in [12], nor the special case a = 1 is covered in [5].

We mentioned a modular type game in [10], where a player may have to remove a multiple of K (K is a fixed positive integer) tokens in each move, and the move rules are the same as in (s, t)-Wythoff’s game. Thus the case K = 1 is exactly (s, t)-Wythoff’s game, and the case K = 2 is our Restricted (s, t)-Wythoff. Another question of interest is to consider what the results might be if we exploit the idea “adding P-positions as moves” to examine this modular type game, which is worth further studying and it is in our agenda.

Acknowledgement

This work is supported by the National Natural Science Foundation of China under Grants 61373174.

References

[1] Duchêne, E., Fraenkel, A.S., Nowakowski, R.J., Rigo, M., Extensions and restrictions of Wythoff’s game preserving its P-positions, J. Combin. Theory Ser. A, 2010, 117, 545-567.10.1016/j.jcta.2009.07.010Search in Google Scholar

[2] Fraenkel, A.S., New games related to old and new sequences, Integers, Electr. J. Combin. Number Theory, 2004, 4, #G6.10.1007/978-0-387-35706-5_24Search in Google Scholar

[3] Berlekamp, E.R., Conway, J.H., Guy, R.K., Winning Ways for Your Mathematical Plays, Volume 1-4, A K Peters, Wellesley, MA, 2001-2004. 2nd edition: vol.1 (2001), vols. 2,3 (2003), vol. 4 (2004).Search in Google Scholar

[4] Duchêne, E., Gravier, S., Geometrical extensions of Wythoff’s game, Discrete Math., 2009, 309, 3595-3608.10.1016/j.disc.2007.12.089Search in Google Scholar

[5] Fraenkel, A.S., How to beat your Wythoff games’ opponent on three fronts, Amer. Math. Monthly, 1982, 89, 353-361.10.1080/00029890.1982.11995454Search in Google Scholar

[6] Fraenkel, A.S., Heap games, Numeration systems and Sequences, Annals Combin., 1998, 2, 197-210.10.1007/BF01608532Search in Google Scholar

[7] Fraenkel, A.S., Borosh, I., A generalization of Wythoff’s game, J. Combin. Theory, Ser. A, 1973,15,175-191.10.1016/S0097-3165(73)80005-6Search in Google Scholar

[8] Fraenkel, A.S., Zusman, D., A new heap game, Theoret. Comput. Sci., 2001, 252, 5-12.10.1007/3-540-48957-6_13Search in Google Scholar

[9] Liu, W.A., Li, H., General Restriction of (s, t)-Wythoff’s Game, Electron. J. Combin., 2014, 21(2), #P2.44.10.37236/2963Search in Google Scholar

[10] Li, H., Liu, S., Fraenkel, A.S., Liu, W.A., Variants of (s, t)-Wythoff’s game, accepted for publiction.Search in Google Scholar

[11] Fraenkel, A.S., Ozery, M., Adjoining to Wythoff’s game its P-positions as moves, Theoret. Comput. Sci., 1998, 205, 283-296.10.1016/S0304-3975(98)00044-9Search in Google Scholar

[12] Liu, W.A., Zhao, X., Adjoining to (s, t)-Wythoff’s game its P-positions as moves, Discrete Appl. Math., 2014, 179, 28-43.10.1016/j.dam.2014.08.009Search in Google Scholar

[13] Li, H., Liu, S., Extensions and restrictions of a-Wythoff’s game, submitted for publiction.Search in Google Scholar

[14] Fraenkel, A.S., Systems of numeration, Amer. Math. Monthly 92 (1985), 105-114.10.1109/ARITH.1983.6158079Search in Google Scholar

[15] Fraenkel, A.S., The vile, dopey, evil and odious game players, Discrete Math., 312 (2012), 42-46, special volume in honor of the 80th birthday of Gert Sabidussi.10.1016/j.disc.2011.03.032Search in Google Scholar

Received: 2016-7-31
Accepted: 2017-1-26
Published Online: 2017-3-20

© 2017 Liu and Li

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Integrals of Frullani type and the method of brackets
  3. Regular Articles
  4. Edge of chaos in reaction diffusion CNN model
  5. Regular Articles
  6. Calculus using proximities: a mathematical approach in which students can actually prove theorems
  7. Regular Articles
  8. An investigation on hyper S-posets over ordered semihypergroups
  9. Regular Articles
  10. The Leibniz algebras whose subalgebras are ideals
  11. Regular Articles
  12. Fixed point and multidimensional fixed point theorems with applications to nonlinear matrix equations in terms of weak altering distance functions
  13. Regular Articles
  14. Matrix rank and inertia formulas in the analysis of general linear models
  15. Regular Articles
  16. The hybrid power mean of quartic Gauss sums and Kloosterman sums
  17. Regular Articles
  18. Tauberian theorems for statistically (C,1,1) summable double sequences of fuzzy numbers
  19. Regular Articles
  20. Some properties of graded comultiplication modules
  21. Regular Articles
  22. The characterizations of upper approximation operators based on special coverings
  23. Regular Articles
  24. Bi-integrable and tri-integrable couplings of a soliton hierarchy associated with SO(4)
  25. Regular Articles
  26. Dynamics for a discrete competition and cooperation model of two enterprises with multiple delays and feedback controls
  27. Regular Articles
  28. A new view of relationship between atomic posets and complete (algebraic) lattices
  29. Regular Articles
  30. A class of extensions of Restricted (s, t)-Wythoff’s game
  31. Regular Articles
  32. New bounds for the minimum eigenvalue of 𝓜-tensors
  33. Regular Articles
  34. Shintani and Shimura lifts of cusp forms on certain arithmetic groups and their applications
  35. Regular Articles
  36. Empirical likelihood for quantile regression models with response data missing at random
  37. Regular Articles
  38. Convex combination of analytic functions
  39. Regular Articles
  40. On the Yang-Baxter-like matrix equation for rank-two matrices
  41. Regular Articles
  42. Uniform topology on EQ-algebras
  43. Regular Articles
  44. Integrations on rings
  45. Regular Articles
  46. The quasilinear parabolic kirchhoff equation
  47. Regular Articles
  48. Avoiding rainbow 2-connected subgraphs
  49. Regular Articles
  50. On non-Hopfian groups of fractions
  51. Regular Articles
  52. Singularly perturbed hyperbolic problems on metric graphs: asymptotics of solutions
  53. Regular Articles
  54. Rings in which elements are the sum of a nilpotent and a root of a fixed polynomial that commute
  55. Regular Articles
  56. Superstability of functional equations related to spherical functions
  57. Regular Articles
  58. Evaluation of the convolution sum involving the sum of divisors function for 22, 44 and 52
  59. Regular Articles
  60. Weighted minimal translation surfaces in the Galilean space with density
  61. Regular Articles
  62. Complete convergence for weighted sums of pairwise independent random variables
  63. Regular Articles
  64. Binomials transformation formulae for scaled Fibonacci numbers
  65. Regular Articles
  66. Growth functions for some uniformly amenable groups
  67. Regular Articles
  68. Hopf bifurcations in a three-species food chain system with multiple delays
  69. Regular Articles
  70. Oscillation and nonoscillation of half-linear Euler type differential equations with different periodic coefficients
  71. Regular Articles
  72. Osculating curves in 4-dimensional semi-Euclidean space with index 2
  73. Regular Articles
  74. Some new facts about group 𝒢 generated by the family of convergent permutations
  75. Regular Articles
  76. lnfinitely many solutions for fractional Schrödinger equations with perturbation via variational methods
  77. Regular Articles
  78. Supersolvable orders and inductively free arrangements
  79. Regular Articles
  80. Asymptotically almost automorphic solutions of differential equations with piecewise constant argument
  81. Regular Articles
  82. Finite groups whose all second maximal subgroups are cyclic
  83. Regular Articles
  84. Semilinear systems with a multi-valued nonlinear term
  85. Regular Articles
  86. Positive solutions for Hadamard differential systems with fractional integral conditions on an unbounded domain
  87. Regular Articles
  88. Calibration and simulation of Heston model
  89. Regular Articles
  90. One kind sixth power mean of the three-term exponential sums
  91. Regular Articles
  92. Cyclic pairs and common best proximity points in uniformly convex Banach spaces
  93. Regular Articles
  94. The uniqueness of meromorphic functions in k-punctured complex plane
  95. Regular Articles
  96. Normalizers of intermediate congruence subgroups of the Hecke subgroups
  97. Regular Articles
  98. The hyperbolicity constant of infinite circulant graphs
  99. Regular Articles
  100. Scott convergence and fuzzy Scott topology on L-posets
  101. Regular Articles
  102. One sided strong laws for random variables with infinite mean
  103. Regular Articles
  104. The join of split graphs whose completely regular endomorphisms form a monoid
  105. Regular Articles
  106. A new branch and bound algorithm for minimax ratios problems
  107. Regular Articles
  108. Upper bound estimate of incomplete Cochrane sum
  109. Regular Articles
  110. Value distributions of solutions to complex linear differential equations in angular domains
  111. Regular Articles
  112. The nonlinear diffusion equation of the ideal barotropic gas through a porous medium
  113. Regular Articles
  114. The Sheffer stroke operation reducts of basic algebras
  115. Regular Articles
  116. Extensions and improvements of Sherman’s and related inequalities for n-convex functions
  117. Regular Articles
  118. Classification lattices are geometric for complete atomistic lattices
  119. Regular Articles
  120. Possible numbers of x’s in an {x, y}-matrix with a given rank
  121. Regular Articles
  122. New error bounds for linear complementarity problems of weakly chained diagonally dominant B-matrices
  123. Regular Articles
  124. Boundedness of vector-valued B-singular integral operators in Lebesgue spaces
  125. Regular Articles
  126. On the Golomb’s conjecture and Lehmer’s numbers
  127. Regular Articles
  128. Some applications of the Archimedean copulas in the proof of the almost sure central limit theorem for ordinary maxima
  129. Regular Articles
  130. Dual-stage adaptive finite-time modified function projective multi-lag combined synchronization for multiple uncertain chaotic systems
  131. Regular Articles
  132. Corrigendum to: Dual-stage adaptive finite-time modified function projective multi-lag combined synchronization for multiple uncertain chaotic systems
  133. Regular Articles
  134. Convergence and stability of generalized φ-weak contraction mapping in CAT(0) spaces
  135. Regular Articles
  136. Triple solutions for a Dirichlet boundary value problem involving a perturbed discrete p(k)-Laplacian operator
  137. Regular Articles
  138. OD-characterization of alternating groups Ap+d
  139. Regular Articles
  140. On Jordan mappings of inverse semirings
  141. Regular Articles
  142. On generalized Ehresmann semigroups
  143. Regular Articles
  144. On topological properties of spaces obtained by the double band matrix
  145. Regular Articles
  146. Representing derivatives of Chebyshev polynomials by Chebyshev polynomials and related questions
  147. Regular Articles
  148. Chain conditions on composite Hurwitz series rings
  149. Regular Articles
  150. Coloring subgraphs with restricted amounts of hues
  151. Regular Articles
  152. An extension of the method of brackets. Part 1
  153. Regular Articles
  154. Branch-delete-bound algorithm for globally solving quadratically constrained quadratic programs
  155. Regular Articles
  156. Strong edge geodetic problem in networks
  157. Regular Articles
  158. Ricci solitons on almost Kenmotsu 3-manifolds
  159. Regular Articles
  160. Uniqueness of meromorphic functions sharing two finite sets
  161. Regular Articles
  162. On the fourth-order linear recurrence formula related to classical Gauss sums
  163. Regular Articles
  164. Dynamical behavior for a stochastic two-species competitive model
  165. Regular Articles
  166. Two new eigenvalue localization sets for tensors and theirs applications
  167. Regular Articles
  168. κ-strong sequences and the existence of generalized independent families
  169. Regular Articles
  170. Commutators of Littlewood-Paley gκ -functions on non-homogeneous metric measure spaces
  171. Regular Articles
  172. On decompositions of estimators under a general linear model with partial parameter restrictions
  173. Regular Articles
  174. Groups and monoids of Pythagorean triples connected to conics
  175. Regular Articles
  176. Hom-Lie superalgebra structures on exceptional simple Lie superalgebras of vector fields
  177. Regular Articles
  178. Numerical methods for the multiplicative partial differential equations
  179. Regular Articles
  180. Solvable Leibniz algebras with NFn Fm1 nilradical
  181. Regular Articles
  182. Evaluation of the convolution sums ∑al+bm=n lσ(l) σ(m) with ab ≤ 9
  183. Regular Articles
  184. A study on soft rough semigroups and corresponding decision making applications
  185. Regular Articles
  186. Some new inequalities of Hermite-Hadamard type for s-convex functions with applications
  187. Regular Articles
  188. Deficiency of forests
  189. Regular Articles
  190. Perfect codes in power graphs of finite groups
  191. Regular Articles
  192. A new compact finite difference quasilinearization method for nonlinear evolution partial differential equations
  193. Regular Articles
  194. Does any convex quadrilateral have circumscribed ellipses?
  195. Regular Articles
  196. The dynamic of a Lie group endomorphism
  197. Regular Articles
  198. On pairs of equations in unlike powers of primes and powers of 2
  199. Regular Articles
  200. Differential subordination and convexity criteria of integral operators
  201. Regular Articles
  202. Quantitative relations between short intervals and exceptional sets of cubic Waring-Goldbach problem
  203. Regular Articles
  204. On θ-commutators and the corresponding non-commuting graphs
  205. Regular Articles
  206. Quasi-maximum likelihood estimator of Laplace (1, 1) for GARCH models
  207. Regular Articles
  208. Multiple and sign-changing solutions for discrete Robin boundary value problem with parameter dependence
  209. Regular Articles
  210. Fundamental relation on m-idempotent hyperrings
  211. Regular Articles
  212. A novel recursive method to reconstruct multivariate functions on the unit cube
  213. Regular Articles
  214. Nabla inequalities and permanence for a logistic integrodifferential equation on time scales
  215. Regular Articles
  216. Enumeration of spanning trees in the sequence of Dürer graphs
  217. Regular Articles
  218. Quotient of information matrices in comparison of linear experiments for quadratic estimation
  219. Regular Articles
  220. Fourier series of functions involving higher-order ordered Bell polynomials
  221. Regular Articles
  222. Simple modules over Auslander regular rings
  223. Regular Articles
  224. Weighted multilinear p-adic Hardy operators and commutators
  225. Regular Articles
  226. Guaranteed cost finite-time control of positive switched nonlinear systems with D-perturbation
  227. Regular Articles
  228. A modified quasi-boundary value method for an abstract ill-posed biparabolic problem
  229. Regular Articles
  230. Extended Riemann-Liouville type fractional derivative operator with applications
  231. Topical Issue on Topological and Algebraic Genericity in Infinite Dimensional Spaces
  232. The algebraic size of the family of injective operators
  233. Topical Issue on Topological and Algebraic Genericity in Infinite Dimensional Spaces
  234. The history of a general criterium on spaceability
  235. Topical Issue on Topological and Algebraic Genericity in Infinite Dimensional Spaces
  236. On sequences not enjoying Schur’s property
  237. Topical Issue on Topological and Algebraic Genericity in Infinite Dimensional Spaces
  238. A hierarchy in the family of real surjective functions
  239. Topical Issue on Topological and Algebraic Genericity in Infinite Dimensional Spaces
  240. Dynamics of multivalued linear operators
  241. Topical Issue on Topological and Algebraic Genericity in Infinite Dimensional Spaces
  242. Linear dynamics of semigroups generated by differential operators
  243. Special Issue on Recent Developments in Differential Equations
  244. Isomorphism theorems for some parabolic initial-boundary value problems in Hörmander spaces
  245. Special Issue on Recent Developments in Differential Equations
  246. Determination of a diffusion coefficient in a quasilinear parabolic equation
  247. Special Issue on Recent Developments in Differential Equations
  248. Homogeneous two-point problem for PDE of the second order in time variable and infinite order in spatial variables
  249. Special Issue on Recent Developments in Differential Equations
  250. A nonlinear plate control without linearization
  251. Special Issue on Recent Developments in Differential Equations
  252. Reduction of a Schwartz-type boundary value problem for biharmonic monogenic functions to Fredholm integral equations
  253. Special Issue on Recent Developments in Differential Equations
  254. Inverse problem for a physiologically structured population model with variable-effort harvesting
  255. Special Issue on Recent Developments in Differential Equations
  256. Existence of solutions for delay evolution equations with nonlocal conditions
  257. Special Issue on Recent Developments in Differential Equations
  258. Comments on behaviour of solutions of elliptic quasi-linear problems in a neighbourhood of boundary singularities
  259. Special Issue on Recent Developments in Differential Equations
  260. Coupled fixed point theorems in complete metric spaces endowed with a directed graph and application
  261. Special Issue on Recent Developments in Differential Equations
  262. Existence of entropy solutions for nonlinear elliptic degenerate anisotropic equations
  263. Special Issue on Recent Developments in Differential Equations
  264. Integro-differential systems with variable exponents of nonlinearity
  265. Special Issue on Recent Developments in Differential Equations
  266. Elliptic operators on refined Sobolev scales on vector bundles
  267. Special Issue on Recent Developments in Differential Equations
  268. Multiplicity solutions of a class fractional Schrödinger equations
  269. Special Issue on Recent Developments in Differential Equations
  270. Determining of right-hand side of higher order ultraparabolic equation
  271. Special Issue on Recent Developments in Differential Equations
  272. Asymptotic approximation for the solution to a semi-linear elliptic problem in a thin aneurysm-type domain
  273. Topical Issue on Metaheuristics - Methods and Applications
  274. Learnheuristics: hybridizing metaheuristics with machine learning for optimization with dynamic inputs
  275. Topical Issue on Metaheuristics - Methods and Applications
  276. Nature–inspired metaheuristic algorithms to find near–OGR sequences for WDM channel allocation and their performance comparison
  277. Topical Issue on Cyber-security Mathematics
  278. Monomial codes seen as invariant subspaces
  279. Topical Issue on Cyber-security Mathematics
  280. Expert knowledge and data analysis for detecting advanced persistent threats
  281. Topical Issue on Cyber-security Mathematics
  282. Feedback equivalence of convolutional codes over finite rings
Downloaded on 10.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/math-2017-0022/html
Scroll to top button