Emergence Calculus cover art

All Episodes

Emergence Calculus — 166 episodes

#
Title
1

Terminology: theory versus theory object

2

What this paper adds (Throw)

3

Operational plan and evidence

4

Agency (causation inside a layer)

5

Agenthood versus agency

6

To Throw a Stone: a pop tour of agenthood

7

How this paper was built (Plot)

8

Canonical configuration snapshot (major knobs)

9

Config format and determinism

10

Proof anchors: the minimal claims we can mechanize

11

Six birds, one end-to-end story

12

Predictions

13

What we did not claim

14

Discussion and conclusion: what SBT predicts about space

15

Knobs that matter (practical guidance)

16

Sphere holonomy (E2): neighborhood choice can destabilize curvature estimation

17

Grid (E1): very fine ladders can amplify inter-scale distortion

18

Representative failure modes ("where it breaks")

19

Bird-level interpretation

20

Pythagorean residual as a protocol-composition test

21

Setup: cost from staged isotropic diffusion

22

E2: Curvature as protocol residue (holonomy)

23

Summary of E1—E4

24

E3: Sierpinski gasket (fractal regime)

25

E1: Plane-like emergent metric on a grid

26

Results I: coherent metrics, fractal regimes, and constraint deformation (E1-E4)

27

Two embeddings, two roles

28

Computational note

29

Macro dynamics, cost, and distance

30

Lens choice and (non-)circularity

31

Anisotropic gating (constraints as geometry deformation)

32

Sphere-like substrate (curved regime)

33

Substrates (microstate generators)

34

Checklist: a practical geometry birth audit

35

Connectivity: does the induced metric disconnect?

36

Information (entropy) versus scale

37

Inter-scale distortion: does distance persist across refinement?

38

Prototype stability s_f

39

Diagnostics: when geometry is coherent (and when it breaks)

40

Given a lens: what you can (and can't) see

41

Pseudometric versus metric and separation

42

Directed versus undirected

43

Mathematical status: extended (pseudo-)metrics, directed costs, and quotients

44

Distance is accounting (P6): costs from likelihood

45

Prototypes as lifts: closure representatives (P1, P5)

46

Substrate and micro-dynamics

47

Bird 6 — Audit: Accounting (cost is real)

48

Bird 4 — Sectors: Staging (multi-scale refinement)

49

Bird 2 — Gate: Constraints (feasibility)

50

Six Birds Recap: how the primitives specialize to geometry

51

What we do (high level)

52

The Code Map: How the Audits Are Computed

53

No-Signalling Toy Anchors

54

Closure Descent to Fixed Points

55

Holonomy obstruction (no global time)

56

Reproducibility: regenerating artifacts and paper tables

57

Bonus material: what's hiding in the appendices?

58

Limits and scope: what time claims we're not making

59

What the laboratory demonstrates

60

Connecting back to time: records are local notches, translation is protocol-dependent

61

Signalling Boxes vs Constraints: What's a Real Channel?

62

A Minimal Audit: No-Signalling as the Channel Test

63

SBT Diagnosis: Feasibility Constraints vs Causal Channels

64

Why This Matters for Time in SBT

65

Measured Holonomy in the Toy Laboratory

66

Theorem (No Global Time from Holonomy — Informal)

67

The holonomy obstruction (informal theorem)

68

No global time from protocol holonomy

69

Tick disappearance and undefined tick failure

70

Enablement births time: forced theory extension with a no-birth control

71

Results II: Enablement and Constraints

72

Clock Viability Is Paid: Budgeted Stabilization and Anti-Stall Progress Metrics

73

Arrow Audit II: Path-Reversal KL and 'No Fake Arrows'

74

Results I: Arrows and Clocks

75

Reproducibility and Auto-Generated Paper Tables

76

Audit 7: Constraint Boxes vs Signalling Channels

77

Audit 5: Constraints and Reachability Cones

78

Audit 4: Enablement as Forced Theory Extension

79

Audit 2: Path-Reversal KL and No Fake Arrows Under Coarse-Graining

80

Audit 1: Entropy Production as an Arrow Proxy

81

Methods: A Finite-State Laboratory and Audit Suite

82

Claim 4: No Global Time Under Protocol Holonomy

83

Claim 2: No Fake Arrows Under Coarse-Graining

84

Claim 1: Arrow-of-Time from Packaging and Accounting

85

A Diagnostic: Does the Variable Set Change?

86

Enablement-time (between layers)

87

Two arrows: causation-time vs enablement-time

88

Arrow (irreversible bookkeeping)

89

Ordering: time without clocks

90

The three ingredients: order, measure, and arrow

91

Bird 6 — Audit: Accounting

92

Bird 5 — Package: Packaging

93

Bird 3 — Protocol: Protocol holonomy

94

Bird 2 — Gate: Constraints (feasibility carving)

95

Six Birds Theory recap: primitives and closures

96

What this paper adds (Notch)

97

Defect propagation rules (toolkit)

98

Mode compression from sectorization (P4) and minimality (P5)

99

Coercivity from feasibility gating (P2)

100

Summary: slots and divergence consequence

101

Emergent coercivity template via sector compression

102

Linear-operator specialization

103

Abstract packaging maps

104

Route mismatch defect (abstract)

105

Defects as quantitative relaxations of exact laws

106

Appendix E: Toolkit theory—defects

107

Zeno by vanishing work quantum (WORK fails)

108

Zeno by fast capacity growth (DIV fails)

109

Checkable divergence criteria

110

HL-ROUTE (route mismatch controls gain growth)

111

HL-CAP-X2 (finite memory / kernel mass)

112

HL-CAP-X1 (bounded dissipation density)

113

Hard lemma slots (WORK/CAP/route)

114

Integrated throughput (ICAP) and feasibility

115

Storage-based activity and the WORK quantum (Option B)

116

Setup: frontier and Zeno criterion

117

Appendix D: Zeno cascades and depth

118

ECT compression and capacity witnesses

119

Balanced-atom route (definitions + kernel-mass hinge)

120

Finite forcing / definability rarity

121

Graph topology effects of P2 (edge deletion) and P1 (rewrites)

122

Protocol trap and the "P3 needs P6 drive" correction under autonomy

123

C.2 Evidence by theme (tests and scripts)

124

Reproduce it: how to run the experiments

125

Reproduce it: how to build the project

126

B.2 File map and key declarations

127

Appendix B: Lean formalization map

128

A.2 Python evidence harness (deterministic tests)

129

A.1 Repository integrity checks (from repo root)

130

Outlook: forthcoming instantiations

131

What the theory does and does not claim

132

Finite forcing count: definability is exponentially rare

133

Protocol trap: external schedule vs autonomous lifted model

134

Spotting the Six Birds in the wild (examples)

135

Constraints Kill Engines

136

What Six Birds does *not* claim

137

Downward influence across theories

138

Mapping to the spine

139

Definitions of P1—P6

140

Primitives P1—P6 as closure-changing operations

141

The "Nothing Stays Constant" Lemma

142

Almost Nothing Is Definable

143

Counting lemma: definable predicates are rare

144

Generic extension and the finite forcing lemma

145

P3 Loves P6 Law

146

No Fake Arrows

147

Data processing: coarse-graining cannot create asymmetry

148

Drive Is Coordinate-Free

149

Accounting as coordinates on cycle space

150

Cycle integrals, exactness, and the null regime

151

AUT + REV + ACC regime and graph 1-forms

152

Existence Requires Choosing a Scale

153

Idempotent endomaps

154

Idempotent endomaps and induced closures

155

Closure ladders and saturation

156

Order-theoretic closure and fixed points

157

Assumption bundles

158

Support graphs and discrete 1-forms

159

A unified theory package viewpoint

160

Paths, time reversal, and relative entropy

161

Finite state spaces, distributions, and kernels

162

Protocol geometry and stochastic pumps

163

Graph cycles, affinities, and nonequilibrium network structure

164

Coarse-graining of Markov dynamics and lumpability

165

Closure operators, reflections, and idempotents

166

The organizing picture: a three-certificate loop