Quotient Observation
Hidden Locality, Schur Mediation, and Visible Precision Geometry

J. R. Dunkley
(21st March 2026)
Abstract

We study what can be recovered under partial observation and argue that the intrinsic visible object is quotient-visible precision, denoted Phi, rather than the Donsker-Varadhan Hessian itself. The paper develops a finite, compositional theory of this visible object on the positive cone of precision operators. We prove that quotient observation composes along towers of observation, identify the visible algebraic descendant of the bridge developed in Finite, and show that in the scalar visible case the resulting structure closes into a closed system of precision, clock, transport, and conservation laws. This yields a picture of hidden mediation, including support rigidity, a hidden-load parametrisation, a unique additive interior clock, and a sharp distinction between quotient observation and naive compression. We then turn to nonequilibrium systems and analyse how the visible object is realised in practice. At a symmetry point we obtain a canonical hidden response carrier and a scalar collapse. Away from that point we identify a fast-memory response layer with a two-state homogenised limit, a first-correction Schur carrier, and a source law with an explicit finite-epsilon obstruction. In a separate strong-bias corridor regime we derive a different asymptotic sector and show that these regimes are both real and not presently unified by a single higher operator architecture. The theory is tested against a sequence of benchmark systems used to keep the developing framework tied to a real signal while algebraic closure was being pinned down. These include kinesin, proofreading, transformed semi-Markov, and hidden-feedback ladder tests. Together they support the central claim that quotient-visible precision is the renormalisation-natural visible invariant, while also making the present transfer boundaries explicit. The result is a finished quotient-visible core theory together with a sharply delimited correction-layer package, a falsification battery, and a clear map of what remains open.

Contents

section.1subsection.1.1subsection.1.2subsection.1.3subsection.1.4subsection.1.5section.2subsection.2.1subsection.2.2subsection.2.3subsection.2.4subsection.2.5section.3subsection.3.1subsection.3.2subsection.3.3subsection.3.4subsection.3.5subsection.3.6section.4subsection.4.1subsection.4.2subsection.4.3subsection.4.4subsection.4.5section.5subsection.5.1subsection.5.2subsection.5.3subsection.5.4section.6subsection.6.1subsection.6.2subsection.6.3subsection.6.4section.7subsection.7.1subsection.7.2subsection.7.3subsection.7.4section.8subsection.8.1subsection.8.2subsection.8.3subsection.8.4subsection.8.5subsection.8.6section.9subsection.9.1subsection.9.2subsection.9.3subsection.9.4section.10subsection.10.1subsection.10.2subsection.10.3subsection.10.4subsection.10.5subsection.10.6section.11subsection.11.1subsection.11.2subsection.11.3section.12subsection.12.1subsection.12.2subsection.12.3subsection.12.4subsection.12.5section.13subsection.13.1subsection.13.2subsection.13.3subsection.13.4subsection.13.5subsection.13.6appendix.Asubsection.A.1subsection.A.2subsection.A.3subsection.A.4subsection.A.5appendix.Bsubsection.B.1appendix.Csubsection.C.1appendix.Dsubsection.D.1appendix.Esubsection.E.1subsection.E.2subsection.E.3appendix.Fsubsection.F.1

1  Introduction

1.1 The observation problem

Given that you only see part of a system, what can you recover about its internal structure?

A Markov process runs on nn states; an observer sees only the image under a linear surjection C:nmC:\mathbb{R}^{n}\to\mathbb{R}^{m} with m<nm<n. The question is, what quadratic structure on the visible sector is canonically determined by the full precision and the observation map, with no further choices?

Here we push the full precision through the observation constraint and extract the unique visible quadratic form that records the minimum energy required to realise each visible displacement. The result is a definite positive operator on the visible sector, the quotient-visible precision Φ\Phi, and it is this operator that is the natural visible invariant.

The setting is the Donsker-Varadhan large-deviation geometry of empirical flows in finite-state Markov chains, [1, 2, 3, 4, 5, 6] following our earlier work [7] which established a finite quadratic bridge between the stationary backbone and the nonequilibrium Hessian. It also sits naturally alongside the network and stochastic-thermodynamic description of nonequilibrium observables [8, 9, 10, 11, 12]. Now we ask, what does that bridge produce once hidden degrees of freedom are eliminated by quotient observation?

1.2 Main claim and conceptual picture

The central claim is that Φ\Phi is the intrinsic visible variable. It is defined variationally, it composes along towers of observation, it admits a stable first-order calculus, and it is provably different from compression. No other candidate satisfies all properties simultaneously:

ΦT={X=T1/2ΠT1/2: 0ΠI on S=Ran(T)}\boxed{\scalebox{1.08}{$\displaystyle\Phi_{T}^{\circ}=\left\{X=T^{1/2}\Pi T^{1/2}:\;0\prec\Pi\leq I\ \text{ on }\ S=\operatorname{Ran}(T)\right\}$}}
Φ¯T={X=T1/2ΠT1/2: 0ΠI on S=Ran(T)}=T1/2[0,I]ST1/2\boxed{\scalebox{1.08}{$\displaystyle\overline{\Phi}_{T}=\left\{X=T^{1/2}\Pi T^{1/2}:\;0\leq\Pi\leq I\ \text{ on }\ S=\operatorname{Ran}(T)\right\}=T^{1/2}[0,I]_{S}T^{1/2}$}}

The Donsker-Varadhan bridge [7] identifies a finite visible algebraic object, the tangent descendant of Φ\Phi, but it is Φ\Phi itself that closes under observation. The Hessian is a bridge object: it matters because it leads to Φ\Phi. More precisely, once the tangent ceiling has been fixed on the part of visible space where it acts nontrivially, the exact observed class consists of all visible laws obtained by contracting within that same active sector, without ever creating new visible directions. Finite hidden sectors realise the strict interior of that class, while allowing limits adds the boundary cases. Section 4 makes this precise.

The paper contains two species of results. The first is an algebraic theory of the visible object: its variational characterisation, composition law, conservation structure, hidden-load parametrisation, and graph-local decay. These hold for any quotient observation on any positive precision operator.

The second evaluates this theory in specific nonequilibrium systems: symmetry theorems, fast-memory homogenisation, corridor asymptotics, and thermodynamic constraints. The boundary between the two is maintained throughout.

1.3 Main results

The paper establishes the following results, listed in the order they appear.

  1. (i)

    Quotient observation on the positive cone is variational, composes along observation towers, and produces a coisometric tangent transport with monotone Ky Fan detectability envelopes.

  2. (ii)

    The Donsker-Varadhan bridge produces a finite visible algebraic object via quotient reduction. The first genuinely new quotient effect beyond the tangent law is quartic and sign-definite; smooth divergence functionals built from the visible shadow lose only at sextic order.

  3. (iii)

    In scalar visible rank, the visible precision admits a generator-level Schur simplification and does not depend on the hidden completion at the matched visible-law level.

  4. (iv)

    The visible precision splits as Φ=F0+W\Phi=F_{0}+W, with F0F_{0} the reversible backbone contribution and WW the irreversible correction. This conservation identity holds without remainder.

  5. (v)

    Hidden mediation is parametrised by a positive hidden-load operator on the tangent support. Sequential transport, a unique additive determinant clock, and support rigidity follow.

  6. (vi)

    Graph-local decay of hidden contributions: the visible effect of a hidden perturbation decays with the graph distance between the perturbation site and the visible sector.

  7. (vii)

    On the Bell square, common-cause visible Gaussian gluing is a law-level compatibility problem whose frontier has two independent coordinates.

  8. (viii)

    At the symmetric point of the two-state visible ladder, a symmetry theorem identifies a canonical hidden response carrier, and the visible algebra collapses to one free parameter: F0=α2/(T+α)F_{0}=\alpha^{2}/(T+\alpha) and W=αT/(T+α)W=\alpha T/(T+\alpha).

  9. (ix)

    Fast-memory homogenisation yields a source law and an explicit obstruction to hidden-structure recovery.

  10. (x)

    Corridor asymptotics separate three regimes (fast memory, intermediate, slow memory) with sharp crossover diagnostics.

  11. (xi)

    A thermodynamic ceiling constrains visible precision: ΦF0+σ/2\Phi\leq F_{0}+\sigma/2, where σ\sigma is the entropy production rate.

  12. (xii)

    Timescale duality, the EPR-Fisher bound, and tightness at both timescale limits constrain the visible object within a closed region of parameter space.

1.4 Roadmap

Section 2 formulates quotient observation on the positive cone, proves the variational characterisation and the Fréchet calculus, establishes tower composition, identifies the Schur gap, and names Φ\Phi as the intrinsic visible invariant. Section 3 connects the quotient theory to the Donsker-Varadhan bridge from [7], establishes the visible algebraic object, and proves the quartic defect and sextic robustness theorems.

Sections 4-6 develop the internal structure of Φ\Phi: hidden mediation and the conservation split, hidden locality and graph-local decay, and the Bell-square gluing frontier. Sections 7-9 evaluate the algebraic theory in nonequilibrium systems: symmetry at the symmetric point, fast-memory homogenisation with source law and obstruction, and corridor asymptotics with regime separation.

Section 10 synthesises the benchmark evidence, Section 11 presents falsification diagnostics, Section 12 states the proved boundary, and Section 13 discusses what remains open and what geometric structure lies at the frontier.

1.5 Notation and glossary

The upstairs space n\mathbb{R}^{n} carries the full precision operator HH; the downstairs space m\mathbb{R}^{m} carries the visible precision Φ\Phi. An observation is a surjective linear map C:nmC:\mathbb{R}^{n}\to\mathbb{R}^{m}. An observation tower is a chain of surjections nm1m2\mathbb{R}^{n}\to\mathbb{R}^{m_{1}}\to\mathbb{R}^{m_{2}}; the composition theorem says that observing once or in two steps gives the same visible precision.

The backbone H0H_{0} is the time-symmetric part of the full precision. The irreversible correction WW is the contribution from detailed-balance-breaking currents. The conservation split is Φ=F0+W\Phi=F_{0}+W, where F0:=ΦC(H0)F_{0}:=\Phi_{C}(H_{0}) is the quotient-visible backbone.

We write Sym++(n)\mathrm{Sym}_{++}(n) for the cone of n×nn\times n symmetric positive definite matrices, ΦC(H)\Phi_{C}(H) or FC(H)F_{C}(H) for the quotient map, and \succeq for the Loewner partial order.

2  Quotient observation and the intrinsic visible object

For a positive precision operator HSym++(n)H\in\mathrm{Sym}_{++}(n) and a surjective observation map Cm×nC\in\mathbb{R}^{m\times n}, the visible operator is

ΦC(H):=FC(H):=(CH1C𝖳)1.\Phi_{C}(H):=F_{C}(H):=\bigl(CH^{-1}C^{\mathsf{T}}\bigr)^{-1}. (2.1)

This is the visible precision canonically induced by (H,C)(H,C). It is the positive-definite shorted or Schur-complement construction associated with the observation map in the operator-theoretic sense of [13, 14, 15, 16, 17]. It is not chosen or assumed, instead forced by the observation problem itself: for each visible displacement, it records the least full-space energy needed to realise that displacement.

It has a variational meaning, it admits a clean differential calculus, it composes along towers of observation, and it differs in a controlled way from naive visible compression. Those facts identify Φ\Phi as the visible invariant carried by quotient observation.

2.1 Setting and quotient observation on the positive cone

Fix a surjective linear map C:nmC:\mathbb{R}^{n}\to\mathbb{R}^{m}. For each visible displacement ymy\in\mathbb{R}^{m}, consider the constrained quadratic energy

H(y):=inf{x𝖳Hx:Cx=y}.\mathcal{E}_{H}(y):=\inf\!\left\{x^{\mathsf{T}}Hx:Cx=y\right\}. (2.2)

The positive cone is forced from the start: once the ambient precision is positive definite, the minimisation problem is strictly convex, the minimiser is unique, and the visible quadratic form is again positive definite. The quotient-visible precision is characterised by

H(y)=y𝖳ΦC(H)y.\mathcal{E}_{H}(y)=y^{\mathsf{T}}\Phi_{C}(H)y. (2.3)

So the visible operator is not an auxiliary construction, it is the quadratic form selected by the problem.

The same minimisation admits a matching dual formulation. The constrained primal energy upstairs and the dual visible energy downstairs agree, and that agreement is the algebra behind the quotient map. From it one obtains well posedness on Sym++(n)\mathrm{Sym}_{++}(n), positive homogeneity, monotonicity in Loewner order, and concavity, in the standard positive-operator framework of [18, 19, 20, 21, 17]. One also obtains a canonical H0H_{0}-horizontal chart, which separates genuine visible motion from gauge motion inside the hidden kernel and makes the later tangent calculus transparent.

Theorem 2.1 (Variational characterisation).

For every HSym++(n)H\in\mathrm{Sym}_{++}(n) and every surjective CC, the quotient-visible precision ΦC(H)\Phi_{C}(H) is the unique operator in Sym++(m)\mathrm{Sym}_{++}(m) satisfying (2.3). Equivalently,

y𝖳ΦC(H)y=infCx=yx𝖳Hx(ym).y^{\mathsf{T}}\Phi_{C}(H)y=\inf_{Cx=y}x^{\mathsf{T}}Hx\qquad(y\in\mathbb{R}^{m}). (2.4)
Corollary 2.2 (Primal-dual decomposition).

The visible energy admits matching primal and dual representations. In particular, the minimising lift and the maximising visible multiplier encode the same quadratic form.

In this language quotient precision is the minimum-energy visible form induced by the upstairs law, and it sits naturally in the shorted-operator and parallel-addition side of positive-operator theory [15, 14, 22, 23].

Theorem 2.3 (Basic positive-cone calculus).

The map HΦC(H)H\mapsto\Phi_{C}(H) is well posed on Sym++(n)\mathrm{Sym}_{++}(n), positively homogeneous, monotone, and concave. Relative to a fixed base point H0H_{0}, it admits a canonical horizontal chart adapted to quotient observation.

What has been gained already is decisive. Observation no longer looks like a loss of structure followed by arbitrary repair. It produces a definite positive operator with a canonical variational meaning.

2.2 Fréchet calculus and the tangent ceiling

Once the quotient map is fixed, its first-order calculus is immediate. For a symmetric perturbation H˙\dot{H}, the derivative is the visible shadow of that perturbation transported through H1H^{-1} and returned by CC. The main point is not the formula itself, but what it bounds: positive perturbations upstairs induce a maximal first-order visible response, and later hidden-mediation effects can only sit beneath that ceiling.

Theorem 2.4 (Fréchet derivative).

The quotient map is Fréchet differentiable on Sym++(n)\mathrm{Sym}_{++}(n). Its derivative at HH in direction H˙\dot{H} is

DΦC[H](H˙)=ΦC(H)CH1H˙H1C𝖳ΦC(H).D\Phi_{C}[H](\dot{H})=\Phi_{C}(H)\,CH^{-1}\dot{H}H^{-1}C^{\mathsf{T}}\,\Phi_{C}(H). (2.5)
Proposition 2.5 (Tangent ceiling).

If H˙0\dot{H}\succeq 0, then DΦC[H](H˙)0D\Phi_{C}[H](\dot{H})\succeq 0. More sharply, DΦC[H](H˙)D\Phi_{C}[H](\dot{H}) is the maximal first-order visible response compatible with the positive perturbation H˙\dot{H}.

The tangent ceiling is infrastructure rather than endpoint. It identifies the maximal first-order visible response compatible with a given positive perturbation. Later hidden-mediation results will show that hidden structure redistributes or attenuates visible strength beneath this ceiling, but does not create a new visible direction from nothing.

2.3 Exact composition along observation towers

The decisive structural fact is composition. Suppose observation occurs in stages,

nC1m1C2m2,C=C2C1.\mathbb{R}^{n}\xrightarrow{\ C_{1}\ }\mathbb{R}^{m_{1}}\xrightarrow{\ C_{2}\ }\mathbb{R}^{m_{2}},\qquad C=C_{2}C_{1}. (2.6)

Then one may observe once or observe in two steps. The result is the same:

ΦC(H)=ΦC2(ΦC1(H)).\Phi_{C}(H)=\Phi_{C_{2}}\!\bigl(\Phi_{C_{1}}(H)\bigr). (2.7)

So quotient observation closes on itself. The visible object keeps its type under repeated elimination of hidden structure.

Theorem 2.6 (Composition law).

For surjective observation maps C1C_{1} and C2C_{2} with C=C2C1C=C_{2}C_{1},

ΦC(H)=ΦC2(ΦC1(H)).\Phi_{C}(H)=\Phi_{C_{2}}\!\bigl(\Phi_{C_{1}}(H)\bigr). (2.8)

This is what makes Φ\Phi a renormalisation-natural object rather than an ad hoc one, in the precise sense that repeated elimination stays inside one visible variable rather than generating a new effective object at each stage [24, 25, 26]. No correction term is needed. No auxiliary state has to be remembered. Repeated observation stays inside the same category and returns the same kind of operator.

The tangent theory composes as well. The visible derivative shadow transports down an observation tower by coisometric compression. At the spectral level this yields monotone Ky Fan detectability envelopes: as observation becomes coarser, the visible singular spectrum can only contract [27, 28].

Theorem 2.7 (Tangent shadow transport).

Under tower composition, the derivative shadow of quotient observation transports by a coisometric map WW satisfying WW𝖳=IWW^{\mathsf{T}}=I. Specifically, if C=C2C1C=C_{2}C_{1} and Φ1:=ΦC1(H)\Phi_{1}:=\Phi_{C_{1}}(H), the derivative at the coarser level factors through the derivative at the finer level via coisometric compression. In particular, the Ky Fan singular values of the visible derivative shadow contract monotonically along any observation tower.

With composition known, the role of Φ\Phi changes. It is no longer merely a good definition. It is the object that survives observation in the only way a visible invariant should.

2.4 Compression versus quotient: the Schur gap

Quotient observation is not naive visible compression. Fix a visible-hidden splitting and write

H=(HvvHvhHhvHhh).H=\begin{pmatrix}H_{vv}&H_{vh}\\ H_{hv}&H_{hh}\end{pmatrix}. (2.9)

Compression keeps the principal visible block HvvH_{vv}. Quotient observation eliminates the hidden sector through the inverse and returns the Schur complement [29, 30, 31]

Φ(H)=HvvHvhHhh1Hhv.\Phi(H)=H_{vv}-H_{vh}H_{hh}^{-1}H_{hv}. (2.10)

The difference is the Schur gap

G(H):=HvvΦ(H)=HvhHhh1Hhv0.G(H):=H_{vv}-\Phi(H)=H_{vh}H_{hh}^{-1}H_{hv}\succeq 0. (2.11)

So compression and quotient coincide only when the hidden sector does not feed back into the visible one.

Proposition 2.8 (Schur gap formula).

For every block decomposition adapted to a visible-hidden splitting, the difference between naive compression and quotient observation is the positive semidefinite Schur gap.

{remarkbox}
Remark (Scalar diagnostics).

In scalar visible rank, useful summaries include trG\operatorname{tr}G, Gop\|G\|_{\mathrm{op}}, and the corresponding log-determinant defect. These are diagnostics of hidden contribution.

2.5 The intrinsic visible invariant Φ\Phi

The story is now fixed and quotient observation produces a definite visible precision. That operator has a variational characterisation, a stable first-order calculus, a composition law along observation towers, and a precise distinction from naive compression. Those properties identify Φ\Phi as the intrinsic visible invariant.

The Donsker-Varadhan Hessian has a different role. It is a bridge object upstairs, and it will matter in the next section because it leads to a finite visible algebraic descendant. But the object that closes under observation is Φ\Phi, with the Donsker-Varadhan law surviving as its tangent ceiling. There is no canonical nontrivial ceiling determined by (H,C)(H,C) alone, hidden-load and determinant-clock variables become exact only after a ceiling or reference has been declared. By contrast, quotient precision Φ\Phi is intrinsic to the observed pair (H,C)(H,C) itself. This is why the visible variable closes under observation towers, while ceiling-mediated hidden comparison adds further exact structure only after the ambient reference has been fixed.

That is the operator one can transport, compare, and compose without leaving the observation category. The paired-spectrum obstruction (§4) makes this precise: at fixed visible dimension, the Donsker-Varadhan Hessian generically does not close, and the quotient precision is the correct replacement.

A second structural theme begins here. Later results will show that, in scalar visible rank, the visible precision splits as

Φ=F0+W,\Phi=F_{0}+W, (2.12)

with F0F_{0} the reversible backbone and WW the irreversible correction. The point here is only conceptual: Φ\Phi is large enough to carry both contributions while remaining stable under observation.

3  The Donsker-Varadhan bridge and the visible algebraic object

The Donsker-Varadhan bridge from [7] produces a finite visible algebraic object, the tangent descendant of Φ\Phi. The quartic and sextic defect theorems below measure how much structure survives the transition from tangent to full covariance level.

3.1 The bridge and its quotient reduction

Section 3 of [7] proved the exact quadratic Donsker-Varadhan bridge

HDV=H0+ΔDV,ΔDV=14KH01K𝖳0,H_{\mathrm{DV}}=H_{0}+\Delta_{\mathrm{DV}},\qquad\Delta_{\mathrm{DV}}=\tfrac{1}{4}\,K\,H_{0}^{-1}\,K^{\mathsf{T}}\succeq 0, (3.1)

where H0H_{0} is the time-symmetric backbone precision and KK is the skew current operator. We read the output of this bridge through quotient observation.

Introduce a perturbation parameter by K=εK1K=\varepsilon K_{1}, so that

H(ε)=H0+ε2Δ2+O(ε4).H(\varepsilon)=H_{0}+\varepsilon^{2}\Delta_{2}+O(\varepsilon^{4}). (3.2)

In particular,

Δ2=14K1H01K1𝖳.\Delta_{2}=\tfrac{1}{4}\,K_{1}\,H_{0}^{-1}\,K_{1}^{\mathsf{T}}. (3.3)
Definition 3.1 (H0H_{0}-adapted quotient sector).

A decomposition V=UUV=U\oplus U^{\perp} is called H0H_{0}-adapted if

H0=(H0,S00H0,F)H_{0}=\begin{pmatrix}H_{0,S}&0\\ 0&H_{0,F}\end{pmatrix} (3.4)

in the associated block coordinates.

The algebraic cascade from bridge to visible object proceeds in three steps:

HDV=H0+14KH01K𝖳[n×n bridge]quotient observation FCΦb=Schurv(Hb)[m×m visible algebraic object]composition (Theorem 2.6)Φ=FC(H)[intrinsic visible invariant, closes]\begin{gathered}H_{\mathrm{DV}}\;=\;H_{0}+\tfrac{1}{4}\,K\,H_{0}^{-1}\,K^{\mathsf{T}}\qquad[n\times n\text{ bridge}]\\[4.0pt] \big\downarrow\quad\text{quotient observation }F_{C}\\[4.0pt] \Phi_{b}\;=\;\operatorname{Schur}_{v}(H_{b})\qquad[m\times m\text{ visible algebraic object}]\\[4.0pt] \big\downarrow\quad\text{composition (Theorem~\ref{thm:composition-law})}\\[4.0pt] \Phi\;=\;F_{C}(H)\qquad[\text{intrinsic visible invariant, closes}]\end{gathered} (3.5)
{remarkbox}
Remark (Source, propagator, field structure).

The bridge (3.1) has a physical reading. The current operator KK is the source, the resolvent H01H_{0}^{-1} is the propagator, and the product KH01K𝖳KH_{0}^{-1}K^{\mathsf{T}} is the induced field correction. The visible algebraic object is the gauge-invariant visible projection of this chain.

3.2 The visible algebraic object

Write the finite reduced block precision as

Hb=H0,b+14KbH0,b1Kb𝖳=(ABB𝖳D),H_{b}\;=\;H_{0,b}+\tfrac{1}{4}\,K_{b}\,H_{0,b}^{-1}\,K_{b}^{\mathsf{T}}\;=\;\begin{pmatrix}A&B\\ B^{\mathsf{T}}&D\end{pmatrix}, (3.6)

where the first coordinate is the visible direction and the remaining coordinates are hidden reduced directions.

Theorem 3.2 (Visible algebraic object).

The visible algebraic descendant of the bridge output is the Schur complement

Φb:=Schurv(Hb)=ABD1B𝖳.\Phi_{b}\;:=\;\operatorname{Schur}_{v}(H_{b})\;=\;A-B\,D^{-1}\,B^{\mathsf{T}}. (3.7)

The Donsker-Varadhan correction is quadratic in the skew channel, and quotient elimination of the hidden reduced directions turns the bridge output into a visible Schur complement. By the composition theorem (Theorem 2.6), Φb\Phi_{b} is a tangent descendant of the intrinsic visible precision Φ\Phi.

3.3 Scalar visible Schur identity and completion-independence package

In scalar visible rank (m=1m=1), the Schur complement reduces to a generator-level identity that does not require explicit diagonalisation of the full precision. The visible precision is a rational function of the generator entries, computable from the stationary distribution and transition rates without spectral decomposition.

Theorem 3.3 (Completion independence at M=1M=1).

At the matched visible-law level, the quotient-visible precision Φ\Phi does not depend on the hidden completion. Two hidden completions that produce the same visible law yield the same visible precision.

The completion-independence hierarchy:

  • Exact for M=1M=1 (proved).

  • Verified numerically for tested ladder families at M=2M=2.

  • Open for general MM and general graph topologies.

3.4 Intrinsic quartic shadow defect and sextic divergence robustness

The quartic order is where quotient observation first departs from the tangent law.

Theorem 3.4 (Signed quartic bridge).

Assume the Donsker-Varadhan expansion (3.1) with bookkeeping (3.2), and let V=UUV=U\oplus U^{\perp} be H0H_{0}-adapted. Write ΔSF(2)\Delta_{SF}^{(2)} for the (S,F)(S,F) block of Δ2\Delta_{2} from (3.3). Then:

  1. 1.

    compression recovers the finite-observation visible quadratic law on UU;

  2. 2.

    quotient and compression agree through order ε2\varepsilon^{2};

  3. 3.

    the first genuinely new quotient effect is quartic and sign-definite:

    HUcompHUquot=ε4ΔSF(2)H0,F1ΔFS(2)+O(ε6)0.H_{U}^{\mathrm{comp}}-H_{U}^{\mathrm{quot}}=\varepsilon^{4}\,\Delta_{SF}^{(2)}\,H_{0,F}^{-1}\,\Delta_{FS}^{(2)}+O(\varepsilon^{6})\succeq 0. (3.8)
Proof.

Because the splitting is H0H_{0}-adapted, the mixed backbone blocks vanish. Hence

HSF(ε)=ε2ΔSF(2)+O(ε4),HFF(ε)=H0,F+O(ε2).H_{SF}(\varepsilon)=\varepsilon^{2}\Delta_{SF}^{(2)}+O(\varepsilon^{4}),\qquad H_{FF}(\varepsilon)=H_{0,F}+O(\varepsilon^{2}).

Compression gives the visible block HSS=H0,S+ε2ΔSS(2)+O(ε4)H_{SS}=H_{0,S}+\varepsilon^{2}\Delta_{SS}^{(2)}+O(\varepsilon^{4}), the finite-observation visible quadratic law from [7]. The Schur gap formula (§2) gives

HUcompHUquot=HSFHFF1HFS.H_{U}^{\mathrm{comp}}-H_{U}^{\mathrm{quot}}=H_{SF}\,H_{FF}^{-1}\,H_{FS}.

Substituting the block expansions yields (3.8). ∎

Corollary 3.5 (Tangent closure of visible Donsker-Varadhan geometry).

In the H0H_{0}-adapted setting,

HUquot=H0,S+(ΔDV)SS+O(K4).H_{U}^{\mathrm{quot}}=H_{0,S}+(\Delta_{\mathrm{DV}})_{SS}+O(\lVert K\rVert^{4}). (3.9)

The finite-observation visible law is the quadratic tangent law of quotient observation in the Donsker-Varadhan sector.

Proof.

Combine Theorem 3.4 with (3.1). ∎

The signed quartic bridge identifies where quotient observation departs from compression. At the algebraic level it is a square-completion defect with definite sign, in the same broad spirit as energy-splitting identities familiar from other positive-definite variational settings [32]. The next theorem shows that this departure is intrinsic to the quotient geometry.

Theorem 3.6 (Intrinsic quartic shadow defect and sextic divergence robustness).

Fix a surjection C:VYC:V\to Y and a backbone H0SPD(V)H_{0}\in\mathrm{SPD}(V). Let

H(ε)=H0+ε2Δ2+O(ε4),Δ20,H(\varepsilon)=H_{0}+\varepsilon^{2}\Delta_{2}+O(\varepsilon^{4}),\qquad\Delta_{2}\succeq 0, (3.10)

and set F0:=FC(H0)F_{0}:=F_{C}(H_{0}). Define the tangent visible correction

T0:=DFC(H0)[Δ2],T_{0}:=DF_{C}(H_{0})[\Delta_{2}], (3.11)

the visible shadow

Σexact(ε):=F01/2(FC(H(ε))F0)F01/2,\Sigma_{\mathrm{exact}}(\varepsilon):=F_{0}^{-1/2}\bigl(F_{C}(H(\varepsilon))-F_{0}\bigr)F_{0}^{-1/2}, (3.12)

and the tangent shadow

Σtan(ε):=ε2F01/2T0F01/2.\Sigma_{\mathrm{tan}}(\varepsilon):=\varepsilon^{2}\,F_{0}^{-1/2}\,T_{0}\,F_{0}^{-1/2}. (3.13)

Then:

  1. 1.

    the quotient-visible expansion has the intrinsic form

    FC(H(ε))=F0+ε2T0ε4Q0(Δ2)+O(ε6),F_{C}(H(\varepsilon))=F_{0}+\varepsilon^{2}T_{0}-\varepsilon^{4}Q_{0}(\Delta_{2})+O(\varepsilon^{6}), (3.14)

    where

    Q0(Δ2):=12D2FC(H0)[Δ2,Δ2]0;Q_{0}(\Delta_{2}):=-\tfrac{1}{2}\,D^{2}F_{C}(H_{0})[\Delta_{2},\Delta_{2}]\succeq 0; (3.15)
  2. 2.

    the visible shadow loses first at quartic order,

    Σexact(ε)=Σtan(ε)ε4M0+O(ε6),M0:=F01/2Q0(Δ2)F01/20;\Sigma_{\mathrm{exact}}(\varepsilon)=\Sigma_{\mathrm{tan}}(\varepsilon)-\varepsilon^{4}M_{0}+O(\varepsilon^{6}),\qquad M_{0}:=F_{0}^{-1/2}\,Q_{0}(\Delta_{2})\,F_{0}^{-1/2}\succeq 0; (3.16)
  3. 3.

    for every smooth spectral functional Ψ\Psi on symmetric matrices with Ψ(0)=0\Psi(0)=0 and DΨ(0)=0D\Psi(0)=0,

    Ψ(Σtan(ε))Ψ(Σexact(ε))=O(ε6).\Psi\!\bigl(\Sigma_{\mathrm{tan}}(\varepsilon)\bigr)-\Psi\!\bigl(\Sigma_{\mathrm{exact}}(\varepsilon)\bigr)=O(\varepsilon^{6}). (3.17)

    In particular, reverse Gaussian KL, forward Gaussian KL, and squared Hellinger first lose only at sextic order.

Proof.

The quotient map FCF_{C} is smooth on the positive cone, so Taylor expansion at H0H_{0} along the curve H(ε)=H0+ε2Δ2H(\varepsilon)=H_{0}+\varepsilon^{2}\Delta_{2} gives

FC(H(ε))=FC(H0)+ε2DFC(H0)[Δ2]+12ε4D2FC(H0)[Δ2,Δ2]+O(ε6).F_{C}(H(\varepsilon))=F_{C}(H_{0})+\varepsilon^{2}DF_{C}(H_{0})[\Delta_{2}]+\tfrac{1}{2}\varepsilon^{4}D^{2}F_{C}(H_{0})[\Delta_{2},\Delta_{2}]+O(\varepsilon^{6}).

Using the definitions of F0F_{0}, T0T_{0}, and Q0(Δ2):=12D2FC(H0)[Δ2,Δ2]Q_{0}(\Delta_{2}):=-\tfrac{1}{2}D^{2}F_{C}(H_{0})[\Delta_{2},\Delta_{2}] yields (3.14). Conjugating by F01/2F_{0}^{-1/2} gives (3.16).

For the spectral-functional claim, both Σtan(ε)\Sigma_{\mathrm{tan}}(\varepsilon) and Σexact(ε)\Sigma_{\mathrm{exact}}(\varepsilon) are O(ε2)O(\varepsilon^{2}), and their difference is O(ε4)O(\varepsilon^{4}) by (3.16). Since Ψ(0)=0\Psi(0)=0 and DΨ(0)=0D\Psi(0)=0, the Taylor expansion of Ψ\Psi at the origin begins quadratically. Applying that expansion to the pair (Σtan(ε),Σexact(ε))(\Sigma_{\mathrm{tan}}(\varepsilon),\Sigma_{\mathrm{exact}}(\varepsilon)) shows that the first possible difference appears at order ε6\varepsilon^{6}, which proves (3.17). ∎

{remarkbox}
Remark.

In the canonical H0H_{0}-horizontal chart of §2, the quartic Hessian defect Q0(Δ2)Q_{0}(\Delta_{2}) reduces to the signed quartic bridge of Theorem 3.4. The adapted block formula is the coordinate representation of an intrinsic quotient-geometric defect.

3.5 What the bridge still contributes conceptually

{remarkbox}
Remark (Computation versus interpretation).

In the scalar visible case (m=1m=1), the bridge may be algebraically bypassed: the visible precision can be computed directly from the generator. The bridge nonetheless matters as the systematic path from the Donsker-Varadhan Hessian to the quotient-visible precision. The distinction is between computation (which the scalar case streamlines) and interpretation (which the bridge provides at any rank).

3.6 Boundaries of the scalar simplification

The scalar simplification of §3.3 does not extend to general visible rank. When m>1m>1, the visible precision Φ\Phi is a matrix whose internal structure (eigenvalues, eigenvectors, parametric dependence) is not determined by scalar diagnostics.

Visible-law encoding of Φ\Phi is M=1M=1-specific: one can read Φ\Phi from the visible switching rates. For general MM, the visible law constrains but does not determine Φ\Phi. What additional structure is needed at higher rank remains open.

The algebraic theory (§2) and the bridge connection are in hand. The next sections develop the internal structure of Φ\Phi: hidden mediation, conservation, locality, and the gluing frontier.

4  Hidden mediation, scalar clocks, and sequential transport

Section 3 identified the visible algebraic object. The next question is internal: what hidden mechanism produces a visible law beneath the tangent ceiling, how does that mechanism compose, and which scalar quantity measures its cumulative action? The answer is hidden mediation. Beneath a fixed tangent ceiling, every support-preserving visible law is classified by a positive hidden load, sequential composition transports that load by a rigid conjugation law, and the only continuous orthogonally invariant additive clock on the interior is the determinant clock. The section closes by isolating the obstruction that prevents same-dimension Donsker-Varadhan closure from being the correct observable class.

4.1 Exact latent-contraction formula and the tangent ceiling

Work in an H0H_{0}-adapted quotient chart and whiten by the backbone so that the upstairs precision takes the form

H~=I+LL𝖳,L=(BM),\widetilde{H}=I+LL^{\mathsf{T}},\qquad L=\begin{pmatrix}B\\ M\end{pmatrix}, (4.1)

where BB contains the visible rows and MM the hidden rows. In this representation the tangent ceiling is explicit: quotient observation keeps the same visible support ceiling as compression, but contracts beneath it by a positive hidden contribution. At the level of Gaussian graphical models this is hidden-variable precision geometry, not a heuristic latent-variable ansatz [33, 34, 35].

Theorem 4.1 (Exact latent-contraction formula).

In the setting (4.1), the visible quotient correction is

X=B(I+M𝖳M)1B𝖳.X=B(I+M^{\mathsf{T}}M)^{-1}B^{\mathsf{T}}. (4.2)

The tangent ceiling is

T:=BB𝖳,T:=BB^{\mathsf{T}}, (4.3)

and the gap is

TX=BM𝖳(I+MM𝖳)1MB𝖳0.T-X=B\,M^{\mathsf{T}}(I+MM^{\mathsf{T}})^{-1}M\,B^{\mathsf{T}}\succeq 0. (4.4)

Equivalently,

X=BRB𝖳,R:=(I+M𝖳M)1,0RI.X=BRB^{\mathsf{T}},\qquad R:=(I+M^{\mathsf{T}}M)^{-1},\qquad 0\prec R\leq I. (4.5)
Proof.

In block form,

H~=(I+BB𝖳BM𝖳MB𝖳I+MM𝖳).\widetilde{H}=\begin{pmatrix}I+BB^{\mathsf{T}}&BM^{\mathsf{T}}\\ MB^{\mathsf{T}}&I+MM^{\mathsf{T}}\end{pmatrix}.

The visible quotient precision is its Schur complement:

I+BB𝖳BM𝖳(I+MM𝖳)1MB𝖳.I+BB^{\mathsf{T}}-BM^{\mathsf{T}}(I+MM^{\mathsf{T}})^{-1}MB^{\mathsf{T}}.

Using the identity

IM𝖳(I+MM𝖳)1M=(I+M𝖳M)1,I-M^{\mathsf{T}}(I+MM^{\mathsf{T}})^{-1}M=(I+M^{\mathsf{T}}M)^{-1},

we obtain

I+B(I+M𝖳M)1B𝖳.I+B(I+M^{\mathsf{T}}M)^{-1}B^{\mathsf{T}}.

Subtracting the whitened backbone II gives (4.2). The formulae (4.4) and (4.5) follow immediately. ∎

Corollary 4.2 (Exact support theorem).

For every finite hidden sector,

Ran(X)=Ran(T),rank(X)=rank(T).\operatorname{Ran}(X)=\operatorname{Ran}(T),\qquad\operatorname{rank}(X)=\operatorname{rank}(T). (4.6)

Thus finite hidden mediation preserves the visible correction support. In particular, the hidden sector attenuates inside the existing visible support rather than creating new visible directions, which is also the natural completion geometry for latent Gaussian models [36, 35].

Proof.

Since R0R\succ 0 on the latent space, BRB𝖳BRB^{\mathsf{T}} and BB𝖳BB^{\mathsf{T}} have the same range and rank. ∎

{remarkbox}
Remark (Blind directions remain blind).

Corollary 4.2 is the support rigidity statement in ordinary language. If a visible direction receives no signal from the tangent ceiling TT, then no finite hidden architecture can make that direction informative later, because the actual visible correction XX has the same support. Hidden complexity can attenuate or redistribute strength inside the tangent support, but it cannot create a new visible direction from nothing.

4.2 Support-preserving visible cone, its closure, and hidden-load parametrisation

The latent-contraction formula says that hidden mediation acts by attenuation inside the support of the tangent ceiling. The next result identifies the full image of that action.

Proposition 4.3 (Support-preserving interval and closure theorem).

Let T=BB𝖳T=BB^{\mathsf{T}} and let S:=Ran(T)S:=\operatorname{Ran}(T). A matrix XX arises from a finite hidden sector if and only if

X=T1/2ΠT1/2,0ΠI on S.X=T^{1/2}\Pi T^{1/2},\qquad 0\prec\Pi\leq I\text{ on }S. (4.7)

Taking closure adds the boundary 0ΠI0\leq\Pi\leq I on SS. Equivalently, the closure of the visible image is the Loewner interval beneath TT, whose interior is support-preserving.

Proof.

From Theorem 4.1,

X=BRB𝖳,0RI.X=BRB^{\mathsf{T}},\qquad 0\prec R\leq I.

By polar decomposition, B=T1/2UB=T^{1/2}U for a partial isometry UU with initial space the latent support of BB and final space SS. Therefore

X=T1/2(URU𝖳)T1/2,X=T^{1/2}(URU^{\mathsf{T}})T^{1/2},

so (4.7) holds with Π:=URU𝖳\Pi:=URU^{\mathsf{T}}. Since R0R\succ 0 and RIR\leq I, one has 0ΠI0\prec\Pi\leq I on SS.

Conversely, let 0ΠI0\prec\Pi\leq I on SS. Choose the latent space to be SS, set B:=T1/2B:=T^{1/2}, and define R:=ΠR:=\Pi. Since R0R\succ 0 and RIR\leq I, the matrix G:=R1IG:=R^{-1}-I is positive semidefinite. Pick MM with M𝖳M=GM^{\mathsf{T}}M=G. Then (I+M𝖳M)1=R(I+M^{\mathsf{T}}M)^{-1}=R, so X=BRB𝖳X=BRB^{\mathsf{T}}. The boundary case follows by limit. ∎

Exact visible class and its closure. With S:=Ran(T)S:=\operatorname{Ran}(T),

ΦT={X=T1/2ΠT1/2: 0ΠI on S=Ran(T)}\boxed{\displaystyle\Phi_{T}^{\circ}=\left\{X=T^{1/2}\Pi T^{1/2}:\;0\prec\Pi\leq I\ \text{ on }\ S=\operatorname{Ran}(T)\right\}}
Φ¯T={X=T1/2ΠT1/2: 0ΠI on S=Ran(T)}=T1/2[0,I]ST1/2\boxed{\displaystyle\overline{\Phi}_{T}=\left\{X=T^{1/2}\Pi T^{1/2}:\;0\leq\Pi\leq I\ \text{ on }\ S=\operatorname{Ran}(T)\right\}=T^{1/2}[0,I]_{S}T^{1/2}}

Here [0,I]S:={ΠSym(S):0ΠIS}[0,I]_{S}:=\{\Pi\in\mathrm{Sym}(S):0\leq\Pi\leq I_{S}\}. Thus finite hidden sectors realise the support-preserving interior ΦT\Phi_{T}^{\circ}, while taking closure adds the boundary Φ¯T\overline{\Phi}_{T}. The hidden-load coordinate of Theorem 4.4 is defined on ΦT\Phi_{T}^{\circ}, and the next results identify its rank and determinant invariants.

Theorem 4.4 (Intrinsic hidden-load parametrisation).

Let T0T\succeq 0 and let S:=Ran(T)S:=\operatorname{Ran}(T). A visible law XX in the support-preserving interior beneath TT is equivalently an operator of the form

X=T1/2ΠT1/2,0ΠI on S.X=T^{1/2}\Pi T^{1/2},\qquad 0\prec\Pi\leq I\text{ on }S.

For such XX, define the intrinsic hidden-load operator on SS by

Λ:=(T|S)1/2(X|S)1(T|S)1/2IS.\Lambda:=(T|_{S})^{1/2}(X|_{S})^{-1}(T|_{S})^{1/2}-I_{S}. (4.8)

Then Λ0\Lambda\succeq 0 on SS, and

X=T1/2(IS+Λ)1T1/2.X=T^{1/2}(I_{S}+\Lambda)^{-1}T^{1/2}. (4.9)

Conversely, every Λ0\Lambda\succeq 0 on SS determines a visible law by (4.9). Hence the support-preserving visible interior beneath TT is in bijection with the positive cone on SS.

Proof.

Write

Π:=(T|S)1/2(X|S)(T|S)1/2.\Pi:=(T|_{S})^{-1/2}(X|_{S})(T|_{S})^{-1/2}.

Then 0ΠIS0\prec\Pi\leq I_{S} on SS. Therefore

Λ=Π1IS0,\Lambda=\Pi^{-1}-I_{S}\succeq 0,

and

Π=(IS+Λ)1.\Pi=(I_{S}+\Lambda)^{-1}.

Substituting this into X=T1/2ΠT1/2X=T^{1/2}\Pi T^{1/2} gives (4.9).

Conversely, if Λ0\Lambda\succeq 0 on SS, then Π:=(IS+Λ)1\Pi:=(I_{S}+\Lambda)^{-1} satisfies

0ΠIS,0\prec\Pi\leq I_{S},

so Proposition 4.3 yields a visible realisation

X=T1/2ΠT1/2=T1/2(IS+Λ)1T1/2.X=T^{1/2}\Pi T^{1/2}=T^{1/2}(I_{S}+\Lambda)^{-1}T^{1/2}.

This proves the bijection. ∎

Corollary 4.5 (Hidden-load monotonicity).

Let

Xi=T1/2(IS+Λi)1T1/2,Λi0 on S,X_{i}=T^{1/2}(I_{S}+\Lambda_{i})^{-1}T^{1/2},\qquad\Lambda_{i}\succeq 0\text{ on }S,

for i=0,1i=0,1. Then

Λ1Λ0X1X0.\Lambda_{1}\succeq\Lambda_{0}\quad\Longleftrightarrow\quad X_{1}\preceq X_{0}. (4.10)

Thus increasing hidden load can only attenuate the visible correction.

Proof.

Restrict to SS, where T|S0T|_{S}\succ 0. Congruence by (T|S)1/2(T|_{S})^{-1/2} gives

X1X0(IS+Λ1)1(IS+Λ0)1.X_{1}\preceq X_{0}\quad\Longleftrightarrow\quad(I_{S}+\Lambda_{1})^{-1}\preceq(I_{S}+\Lambda_{0})^{-1}.

Since inversion reverses Loewner order on positive definite operators,

(IS+Λ1)1(IS+Λ0)1IS+Λ1IS+Λ0,(I_{S}+\Lambda_{1})^{-1}\preceq(I_{S}+\Lambda_{0})^{-1}\quad\Longleftrightarrow\quad I_{S}+\Lambda_{1}\succeq I_{S}+\Lambda_{0},

which is (4.10). ∎

{remarkbox}
Remark (One positive-cone geometry seen from two sides).

The quotient programme now contains two positive-cone geometries. First, the global quotient map

HFC(H)=(CH1C𝖳)1H\mapsto F_{C}(H)=(CH^{-1}C^{\mathsf{T}})^{-1}

is monotone and concave on the upstairs positive cone. Second, beneath a fixed tangent ceiling TT on the active support S=Ran(T)S=\operatorname{Ran}(T), every support-preserving visible law in the interior has the form

X=T1/2(IS+Λ)1T1/2,Λ0.X=T^{1/2}(I_{S}+\Lambda)^{-1}T^{1/2},\qquad\Lambda\succeq 0.

The first is the global quotient-side cone, the second is the intrinsic hidden-load cone after the ceiling has been fixed. They are the global and support-adapted faces of the same attenuation geometry.

Theorem 4.6 (Minimal hidden latent dimension).

Let X=T1/2ΠT1/2X=T^{1/2}\Pi T^{1/2} with 0ΠI0\prec\Pi\leq I on S=Ran(T)S=\operatorname{Ran}(T). Then the minimal hidden latent dimension needed to realise XX is

dmin=rank(IΠ)=rank(TX).d_{\min}=\operatorname{rank}(I-\Pi)=\operatorname{rank}(T-X). (4.11)
Proof.

By Theorem 4.4, write

X=T1/2(IS+Λ)1T1/2,Λ0.X=T^{1/2}(I_{S}+\Lambda)^{-1}T^{1/2},\qquad\Lambda\succeq 0.

Any realisation requires a Gram factorisation Λ=M𝖳M\Lambda=M^{\mathsf{T}}M, so the hidden latent dimension must be at least rank(Λ)\operatorname{rank}(\Lambda). Choosing a Gram factorisation of Λ\Lambda shows that rank(Λ)\operatorname{rank}(\Lambda) hidden dimensions suffice. Since

TX=T1/2(IS(IS+Λ)1)T1/2,T-X=T^{1/2}\Bigl(I_{S}-(I_{S}+\Lambda)^{-1}\Bigr)T^{1/2},

and IS(IS+Λ)1=Λ(IS+Λ)1I_{S}-(I_{S}+\Lambda)^{-1}=\Lambda(I_{S}+\Lambda)^{-1} has the same rank as Λ\Lambda, we obtain

rank(Λ)=rank(TX)=rank(IΠ).\operatorname{rank}(\Lambda)=\operatorname{rank}(T-X)=\operatorname{rank}(I-\Pi).

This proves the claim. ∎

Corollary 4.7 (Rank and volume of hidden load).

With Λ\Lambda as in Theorem 4.4,

rank(Λ)=rank(TX),\operatorname{rank}(\Lambda)=\operatorname{rank}(T-X), (4.12)

and

logpdet(T)logpdet(X)=logdet(IS+Λ).\log\operatorname{pdet}(T)-\log\operatorname{pdet}(X)=\log\det(I_{S}+\Lambda). (4.13)

In particular, the minimal hidden latent dimension is rank(Λ)=rank(TX)\operatorname{rank}(\Lambda)=\operatorname{rank}(T-X).

Proof.

From (4.9),

TX=T1/2(IS(IS+Λ)1)T1/2=T1/2Λ(IS+Λ)1T1/2.T-X=T^{1/2}\Bigl(I_{S}-(I_{S}+\Lambda)^{-1}\Bigr)T^{1/2}=T^{1/2}\Lambda(I_{S}+\Lambda)^{-1}T^{1/2}.

Since (IS+Λ)1(I_{S}+\Lambda)^{-1} is invertible on SS, this implies

rank(TX)=rank(Λ).\operatorname{rank}(T-X)=\operatorname{rank}(\Lambda).

Also, on SS,

X|S=(T|S)1/2(IS+Λ)1(T|S)1/2,X|_{S}=(T|_{S})^{1/2}(I_{S}+\Lambda)^{-1}(T|_{S})^{1/2},

hence

det(X|S)=det(T|S)det(IS+Λ)1.\det(X|_{S})=\det(T|_{S})\det(I_{S}+\Lambda)^{-1}.

Taking logarithms gives (4.13). ∎

{remarkbox}
Remark (Operator-interval picture).

Beneath a fixed tangent ceiling TT, finite hidden sectors realise the support-preserving interior

X=T1/2ΠT1/2,0ΠI on S,X=T^{1/2}\Pi T^{1/2},\qquad 0\prec\Pi\leq I\text{ on }S,

and taking closure adds the boundary 0ΠI0\leq\Pi\leq I on SS. On the interior, the hidden-load coordinate Λ=Π1I\Lambda=\Pi^{-1}-I turns the support-preserving class into the positive cone on the active support. The scalar quantity

logdet(IS+Λ)=logpdet(T)logpdet(X)\log\det(I_{S}+\Lambda)=\log\operatorname{pdet}(T)-\log\operatorname{pdet}(X)

measures latent contraction volume. Same-dimension skew-square closure will appear below as a special paired-spectrum slice inside this larger cone.

4.3 Sequential composition, hidden-load transport, and scalar clocks

All statements in this subsection are made on one fixed active support stratum SS. No claim is made here about a finite additive scalar clock across genuine rank-loss events.

{remarkbox}
Remark.

The coupled field layer leaves the transport algebra of this subsection unchanged on support-stable strata. What changes there is only the infinitesimal generator: the one-step increment becomes M=dtAcpl+o(dt)M=dt\,A_{\mathrm{cpl}}+o(dt) with

Acpl:=12VS1/2(DtαV)SVS1/2,A_{\mathrm{cpl}}:=-\tfrac{1}{2}V_{S}^{-1/2}(D_{t}^{\alpha}V)_{S}V_{S}^{-1/2},

so the present hidden-load transport law applies stratumwise in the coupled regime as well.

Proposition 4.8 (Support-preserving sequential effect law).

Let

(S):={ΠSym(S):0ΠIS}.\mathcal{E}^{\circ}(S):=\{\Pi\in\mathrm{Sym}(S):0\prec\Pi\leq I_{S}\}.

For Π,Ξ(S)\Pi,\Xi\in\mathcal{E}^{\circ}(S) define

ΠΞ:=Π1/2ΞΠ1/2.\Pi\circ\Xi:=\Pi^{1/2}\Xi\Pi^{1/2}. (4.14)

Then ΠΞ(S)\Pi\circ\Xi\in\mathcal{E}^{\circ}(S).

Proof.

Since Ξ0\Xi\succ 0, congruence by Π1/2\Pi^{1/2} preserves positivity and gives ΠΞ0\Pi\circ\Xi\succ 0. Also,

0ΞIS0Π1/2ΞΠ1/2ΠIS.0\prec\Xi\leq I_{S}\quad\Longrightarrow\quad 0\prec\Pi^{1/2}\Xi\Pi^{1/2}\leq\Pi\leq I_{S}.

Hence ΠΞ(S)\Pi\circ\Xi\in\mathcal{E}^{\circ}(S). ∎

{remarkbox}
Remark (The visible law is not the associative object).

The visible product \circ is not associative in general. The true associative object is the underlying contraction composition downstairs. The visible interval is the Gram-shadow image of that contraction composition.

Theorem 4.9 (Exact hidden-load transport law).

Let

Π=(IS+Λ)1,Ξ=(IS+M)1,Λ,M0 on S.\Pi=(I_{S}+\Lambda)^{-1},\qquad\Xi=(I_{S}+M)^{-1},\qquad\Lambda,M\succeq 0\text{ on }S.

Then

ΠΞ=(IS+Λtot)1,\Pi\circ\Xi=(I_{S}+\Lambda_{\mathrm{tot}})^{-1}, (4.15)

with

Λtot=Λ+(IS+Λ)1/2M(IS+Λ)1/2.\Lambda_{\mathrm{tot}}=\Lambda+(I_{S}+\Lambda)^{1/2}M(I_{S}+\Lambda)^{1/2}. (4.16)
Proof.

Because

Π1/2=(IS+Λ)1/2,Ξ1=IS+M,\Pi^{-1/2}=(I_{S}+\Lambda)^{1/2},\qquad\Xi^{-1}=I_{S}+M,

we have

(ΠΞ)1=Π1/2Ξ1Π1/2=(IS+Λ)1/2(IS+M)(IS+Λ)1/2.(\Pi\circ\Xi)^{-1}=\Pi^{-1/2}\Xi^{-1}\Pi^{-1/2}=(I_{S}+\Lambda)^{1/2}(I_{S}+M)(I_{S}+\Lambda)^{1/2}.

Expanding the right-hand side gives

(ΠΞ)1=IS+Λ+(IS+Λ)1/2M(IS+Λ)1/2.(\Pi\circ\Xi)^{-1}=I_{S}+\Lambda+(I_{S}+\Lambda)^{1/2}M(I_{S}+\Lambda)^{1/2}.

This is (4.16). ∎

Corollary 4.10 (Survivor transport law).

Define the survivor complement

Σ(Π):=ISΠ.\Sigma(\Pi):=I_{S}-\Pi.

Then

Σ(ΠΞ)=Σ(Π)+Π1/2Σ(Ξ)Π1/2.\Sigma(\Pi\circ\Xi)=\Sigma(\Pi)+\Pi^{1/2}\Sigma(\Xi)\Pi^{1/2}. (4.17)
Proof.

Use

ISΠ1/2ΞΠ1/2=(ISΠ)+Π1/2(ISΞ)Π1/2.I_{S}-\Pi^{1/2}\Xi\Pi^{1/2}=(I_{S}-\Pi)+\Pi^{1/2}(I_{S}-\Xi)\Pi^{1/2}.

The transport law isolates the correct associative structure, and the scalar clock theorem identifies the only continuous additive quantity compatible with it.

Corollary 4.11 (Additive determinant clock and barrier identity).

Define

τ(Π):=logdetΠ\tau(\Pi):=-\log\det\Pi (4.18)

on (S)\mathcal{E}^{\circ}(S). Then

τ(ΠΞ)=τ(Π)+τ(Ξ).\tau(\Pi\circ\Xi)=\tau(\Pi)+\tau(\Xi). (4.19)

In hidden-load coordinates,

τ(Π)=logdet(IS+Λ).\tau(\Pi)=\log\det(I_{S}+\Lambda). (4.20)

If the unwhitened visible law is

X=T1/2ΠT1/2,X=T^{1/2}\Pi T^{1/2},

then on the active support,

logpdet(T)logpdet(X)=logdet(IS+Λ).\log\operatorname{pdet}(T)-\log\operatorname{pdet}(X)=\log\det(I_{S}+\Lambda). (4.21)
Proof.

Since

det(Π1/2ΞΠ1/2)=det(Π)det(Ξ),\det(\Pi^{1/2}\Xi\Pi^{1/2})=\det(\Pi)\det(\Xi),

we obtain (4.19). Because Π=(IS+Λ)1\Pi=(I_{S}+\Lambda)^{-1}, this is equivalent to (4.20). The pseudo-determinant identity is Corollary 4.7. ∎

Theorem 4.12 (Uniqueness of the additive interior clock).

Let F:(S)F:\mathcal{E}^{\circ}(S)\to\mathbb{R} be continuous, orthogonally invariant, and additive under \circ:

F(ΠΞ)=F(Π)+F(Ξ),F(IS)=0.F(\Pi\circ\Xi)=F(\Pi)+F(\Xi),\qquad F(I_{S})=0.

Then there exists cc\in\mathbb{R} such that

F(Π)=clogdetΠF(\Pi)=c\,\log\det\Pi (4.22)

for all Π(S)\Pi\in\mathcal{E}^{\circ}(S).

Proof.

By orthogonal invariance, it suffices to evaluate FF on diagonal effects. For diagonal matrices,

diag(a1,,ar)diag(b1,,br)=diag(a1b1,,arbr),\operatorname{diag}(a_{1},\dots,a_{r})\circ\operatorname{diag}(b_{1},\dots,b_{r})=\operatorname{diag}(a_{1}b_{1},\dots,a_{r}b_{r}),

with each ai,bi(0,1]a_{i},b_{i}\in(0,1]. Hence continuity and additivity under coordinatewise multiplication imply

F(diag(a1,,ar))=cilogaiF(\operatorname{diag}(a_{1},\dots,a_{r}))=c\sum_{i}\log a_{i}

for some constant cc. Orthogonal invariance extends this to all Π(S)\Pi\in\mathcal{E}^{\circ}(S). ∎

Corollary 4.13 (No finite continuous additive clock on the closed interval).

Let F:[0,IS]F:[0,I_{S}]\to\mathbb{R} be continuous, orthogonally invariant, additive under \circ, and satisfy F(IS)=0F(I_{S})=0. Then

F0.F\equiv 0.
Proof.

Restrict to the interior 0ΠIS0\prec\Pi\leq I_{S}. By Theorem 4.12,

F(Π)=clogdetΠF(\Pi)=c\,\log\det\Pi

there. Consider

Πε=diag(1,,1,ε),ε0.\Pi_{\varepsilon}=\operatorname{diag}(1,\dots,1,\varepsilon),\qquad\varepsilon\downarrow 0.

If c0c\neq 0, then logdetΠε=logε\log\det\Pi_{\varepsilon}=\log\varepsilon\to-\infty, contradicting finite continuity on [0,IS][0,I_{S}]. Thus c=0c=0, hence F0F\equiv 0. ∎

Corollary 4.14 (Extended-real completion of the clock).

Define

τext(Π)={logdetΠ,0ΠIS,+,Π singular.\tau_{\mathrm{ext}}(\Pi)=\begin{cases}-\log\det\Pi,&0\prec\Pi\leq I_{S},\\ +\infty,&\Pi\text{ singular.}\end{cases}

Then τext\tau_{\mathrm{ext}} is additive under \circ in the extended-real sense.

Proof.

Interior additivity is Corollary 4.11. If either factor is singular, then ΠΞ\Pi\circ\Xi is singular, so ++\infty is stable under composition. ∎

Proposition 4.15 (Scalar mediation invariants).

Let

G:=ISΠ=Λ(IS+Λ)1.G:=I_{S}-\Pi=\Lambda(I_{S}+\Lambda)^{-1}.

If λi\lambda_{i} are the eigenvalues of Λ\Lambda, then the eigenvalues of GG are

gi=λi1+λi.g_{i}=\frac{\lambda_{i}}{1+\lambda_{i}}.

Hence

tr(G)=iλi1+λi,\operatorname{tr}(G)=\sum_{i}\frac{\lambda_{i}}{1+\lambda_{i}}, (4.23)
Gop=maxiλi1+λi,\|G\|_{\mathrm{op}}=\max_{i}\frac{\lambda_{i}}{1+\lambda_{i}}, (4.24)

and

τ(Π)=logdet(IS+Λ)=ilog(1+λi).\tau(\Pi)=\log\det(I_{S}+\Lambda)=\sum_{i}\log(1+\lambda_{i}). (4.25)

Thus trace, operator norm, and log-determinant provide complementary scalar diagnostics of total, peak, and volumetric hidden mediation.

Proof.

Since Π=(IS+Λ)1\Pi=(I_{S}+\Lambda)^{-1} is a spectral function of Λ\Lambda, the operators Π\Pi, GG, and Λ\Lambda commute and are simultaneously diagonalisable. On each eigenvector of Λ\Lambda with eigenvalue λi\lambda_{i}, the corresponding eigenvalue of GG is λi/(1+λi)\lambda_{i}/(1+\lambda_{i}). The displayed trace, norm, and log-determinant formulas follow immediately. ∎

Proposition 4.16 (Exact superadditive ceiling-KL identities).

Let

A:=IS+Λ,B:=IS+M,Atot:=A1/2BA1/2,A:=I_{S}+\Lambda,\qquad B:=I_{S}+M,\qquad A_{\mathrm{tot}}:=A^{1/2}BA^{1/2},

and write

P0:=𝒩(0,IS),PΛ:=𝒩(0,A),PM:=𝒩(0,B),PΛtot:=𝒩(0,Atot).P_{0}:=\mathcal{N}(0,I_{S}),\qquad P_{\Lambda}:=\mathcal{N}(0,A),\qquad P_{M}:=\mathcal{N}(0,B),\qquad P_{\Lambda_{\mathrm{tot}}}:=\mathcal{N}(0,A_{\mathrm{tot}}).

Then

DKL(PΛtotP0)=DKL(PΛP0)+DKL(PMP0)+12tr(ΛM),D_{KL}(P_{\Lambda_{\mathrm{tot}}}\|P_{0})=D_{KL}(P_{\Lambda}\|P_{0})+D_{KL}(P_{M}\|P_{0})+\frac{1}{2}\operatorname{tr}(\Lambda M), (4.26)

and, with

GΛ:=IS(IS+Λ)1,GM:=IS(IS+M)1,G_{\Lambda}:=I_{S}-(I_{S}+\Lambda)^{-1},\qquad G_{M}:=I_{S}-(I_{S}+M)^{-1},

one also has

DKL(P0PΛtot)=DKL(P0PΛ)+DKL(P0PM)+12tr(GΛGM).D_{KL}(P_{0}\|P_{\Lambda_{\mathrm{tot}}})=D_{KL}(P_{0}\|P_{\Lambda})+D_{KL}(P_{0}\|P_{M})+\frac{1}{2}\operatorname{tr}(G_{\Lambda}G_{M}). (4.27)

In particular, both Gaussian KL directions relative to the ceiling are superadditive under support-preserving sequential quotienting.

Proof.

For the reverse direction,

DKL(PΛP0)=12(tr(A)rlogdetA),r:=dimS.D_{KL}(P_{\Lambda}\|P_{0})=\frac{1}{2}\bigl(\operatorname{tr}(A)-r-\log\det A\bigr),\qquad r:=\dim S.

Because

tr(Atot)=tr(AB)=r+trΛ+trM+tr(ΛM)\operatorname{tr}(A_{\mathrm{tot}})=\operatorname{tr}(AB)=r+\operatorname{tr}\Lambda+\operatorname{tr}M+\operatorname{tr}(\Lambda M)

and

logdetAtot=logdetA+logdetB,\log\det A_{\mathrm{tot}}=\log\det A+\log\det B,

substitution gives (4.26). For the forward direction,

DKL(P0PΛ)=12(logdetA+tr(A1)r).D_{KL}(P_{0}\|P_{\Lambda})=\frac{1}{2}\bigl(\log\det A+\operatorname{tr}(A^{-1})-r\bigr).

Now

Atot1=A1/2B1A1/2,A_{\mathrm{tot}}^{-1}=A^{-1/2}B^{-1}A^{-1/2},

so cyclicity of trace gives

tr(Atot1)=tr(A1B1).\operatorname{tr}(A_{\mathrm{tot}}^{-1})=\operatorname{tr}(A^{-1}B^{-1}).

Since

A1=ISGΛ,B1=ISGM,A^{-1}=I_{S}-G_{\Lambda},\qquad B^{-1}=I_{S}-G_{M},

we have

tr(A1B1)=rtrGΛtrGM+tr(GΛGM).\operatorname{tr}(A^{-1}B^{-1})=r-\operatorname{tr}G_{\Lambda}-\operatorname{tr}G_{M}+\operatorname{tr}(G_{\Lambda}G_{M}).

Substituting into the forward Gaussian KL formula yields (4.27). ∎

{remarkbox}
Remark (Hidden-load interaction measure).

The cross-term 12tr(ΛM)\tfrac{1}{2}\operatorname{tr}(\Lambda M) in (4.26) is not bookkeeping noise. It is the interaction measure for sequential hidden mediations. It vanishes only when the two mediations are orthogonal in hidden-load space, and otherwise quantifies how much the second mediation is transported by the first before the visible law is read out.

4.4 Conservation split: F0+W=ΦF_{0}+W=\Phi

The determinant clock identifies the only additive scalar content of sequential mediation. The next statement isolates the additive operator content of the visible precision itself.

Theorem 4.17 (Conservation split).

Fix a completion and write

F0:=Fvis(H0),Φ:=Fvis(Halg),W:=ΦF0,F_{0}:=F_{\mathrm{vis}}(H_{0}),\qquad\Phi:=F_{\mathrm{vis}}(H_{\mathrm{alg}}),\qquad W:=\Phi-F_{0}, (4.28)

where H0H_{0} is the reversible backbone and HalgH_{\mathrm{alg}} is the algebraic precision carrying the full visible response. Then

Φ=F0+W.\Phi=F_{0}+W. (4.29)

In scalar visible rank, and more generally on every class of completions for which Φ\Phi is known to be completion-independent, the completion-dependent variations of F0F_{0} and WW compensate so that the total visible precision remains fixed.

Proof.

The identity (4.29) is the definition of WW rewritten. The nontrivial statement is the compensation claim. In scalar visible rank this follows from the completion-independence package of Section 3.3: when two completions produce the same visible law, they produce the same Φ\Phi, hence any change in F0F_{0} must be cancelled by the opposite change in WW. The same implication holds on any broader class of completions for which completion-independence of Φ\Phi has been established. ∎

{remarkbox}
Remark (Ward-identity reading).

The split (4.29) has the structure of a Ward identity. The total visible precision Φ\Phi is the invariant object, while F0F_{0} and WW depend on the chosen completion but are locked in sum. The paper does not need gauge language for the mathematics, but it is the right interpretation of the compensation mechanism.

{remarkbox}
Remark (Reversible and irreversible sectors).

In the Donsker-Varadhan bridge, F0F_{0} is the visible contribution of the time-symmetric backbone H0H_{0} and WW is the visible increment carried by the quadratic skew correction Δ\Delta. The split therefore separates the reversible backbone from the irreversible correction at the level of the intrinsic visible object. It is this separation, not the fixed-dimension Hessian itself, that survives quotient observation.

4.5 Same-dimension closure criterion and its failure boundary

The hidden-load cone is the class closed by quotient elimination. The same observed-dimension Donsker-Varadhan skew-square class is smaller, and its failure boundary is sharp.

Proposition 4.18 (Paired-spectrum criterion).

Let H0,vis0H_{0,\mathrm{vis}}\succ 0 and let Δvis0\Delta_{\mathrm{vis}}\succeq 0 be a visible correction. Set

W:=H0,vis1/2ΔvisH0,vis1/2.W:=H_{0,\mathrm{vis}}^{-1/2}\,\Delta_{\mathrm{vis}}\,H_{0,\mathrm{vis}}^{-1/2}. (4.30)

There exists a visible skew matrix JvisJ_{\mathrm{vis}} of the same observed dimension such that

Δvis=14JvisH0,vis1Jvis𝖳\Delta_{\mathrm{vis}}=\tfrac{1}{4}J_{\mathrm{vis}}H_{0,\mathrm{vis}}^{-1}J_{\mathrm{vis}}^{\mathsf{T}}

if and only if the positive spectrum of WW is pairwise degenerate. In particular, odd visible correction rank is impossible for same-dimension skew-square closure.

This is the same real skew-symmetric pairing obstruction that underlies Williamson-type normal forms and the canonical even-multiplicity structure of skew squares [37, 38].

Proof.

If such JvisJ_{\mathrm{vis}} exists, define

K:=H0,vis1/2JvisH0,vis1/2.K:=H_{0,\mathrm{vis}}^{-1/2}J_{\mathrm{vis}}H_{0,\mathrm{vis}}^{-1/2}.

Then KK is real skew-symmetric and

W=14KK𝖳.W=\tfrac{1}{4}KK^{\mathsf{T}}.

The nonzero singular values of a real skew matrix come in equal pairs, hence the positive eigenvalues of WW do as well.

Conversely, if the positive spectrum of WW is pairwise degenerate, choose an orthogonal basis in which

W=Qdiag(μ1,μ1,μ2,μ2,,0,,0)Q𝖳,μi>0.W=Q\,\operatorname{diag}(\mu_{1},\mu_{1},\mu_{2},\mu_{2},\dots,0,\dots,0)\,Q^{\mathsf{T}},\qquad\mu_{i}>0.

Let

K:=2Qdiag(μ1J2,μ2J2,,0)Q𝖳,K:=2Q\,\operatorname{diag}\!\bigl(\sqrt{\mu_{1}}J_{2},\sqrt{\mu_{2}}J_{2},\dots,0\bigr)Q^{\mathsf{T}},

where J2=(0110)J_{2}=\begin{pmatrix}0&1\\ -1&0\end{pmatrix}. Then KK is real skew-symmetric and W=14KK𝖳W=\tfrac{1}{4}KK^{\mathsf{T}}. Setting

Jvis:=H0,vis1/2KH0,vis1/2J_{\mathrm{vis}}:=H_{0,\mathrm{vis}}^{1/2}KH_{0,\mathrm{vis}}^{1/2}

gives the required representation. ∎

Corollary 4.19 (Paired-spectrum defect as exact distance).

Let WW be as in (4.30), with ordered eigenvalues

λ1λ2λn0.\lambda_{1}\geq\lambda_{2}\geq\cdots\geq\lambda_{n}\geq 0.

Write m:=n/2m:=\lfloor n/2\rfloor and define

λ¯i:=λ2i1+λ2i2,i=1,,m.\bar{\lambda}_{i}:=\frac{\lambda_{2i-1}+\lambda_{2i}}{2},\qquad i=1,\dots,m.

Let

Ppair(W):=Qdiag(λ¯1,λ¯1,,λ¯m,λ¯m, 0 if n is odd)Q𝖳,P_{\mathrm{pair}}(W):=Q\,\operatorname{diag}(\bar{\lambda}_{1},\bar{\lambda}_{1},\dots,\bar{\lambda}_{m},\bar{\lambda}_{m},\,0\text{ if }n\text{ is odd})\,Q^{\mathsf{T}}, (4.31)

where W=Qdiag(λ1,,λn)Q𝖳W=Q\operatorname{diag}(\lambda_{1},\dots,\lambda_{n})Q^{\mathsf{T}} is an orthogonal spectral decomposition. Then Ppair(W)P_{\mathrm{pair}}(W) belongs to the same observed-dimension skew-square slice from Proposition 4.18, and it is the unique Frobenius-nearest point in that slice. Equivalently,

inf{WZF:Z=14KK𝖳,K𝖳=K,Kn×n}=WPpair(W)F.\inf\Bigl\{\lVert W-Z\rVert_{F}:Z=\tfrac{1}{4}KK^{\mathsf{T}},\ K^{\mathsf{T}}=-K,\ K\in\mathbb{R}^{n\times n}\Bigr\}=\lVert W-P_{\mathrm{pair}}(W)\rVert_{F}. (4.32)

Moreover,

WPpair(W)F2=12i=1m(λ2i1λ2i)2+{0,n even,λn2,n odd.\lVert W-P_{\mathrm{pair}}(W)\rVert_{F}^{2}=\frac{1}{2}\sum_{i=1}^{m}(\lambda_{2i-1}-\lambda_{2i})^{2}\,+\,\begin{cases}0,&n\text{ even},\\ \lambda_{n}^{2},&n\text{ odd}.\end{cases} (4.33)

In particular, the defect vanishes if and only if same observed-dimension skew-square closure holds.

Proof.

By Proposition 4.18, the target class consists of matrices of the form 14KK𝖳\tfrac{1}{4}KK^{\mathsf{T}} with K𝖳=KK^{\mathsf{T}}=-K, equivalently positive semidefinite matrices whose positive eigenvalues occur in equal adjacent pairs, with one forced zero when nn is odd. Fix such a target matrix ZZ. For fixed eigenvalues of ZZ, the Frobenius distance

WZF2=tr(W2)+tr(Z2)2tr(WZ)\lVert W-Z\rVert_{F}^{2}=\operatorname{tr}(W^{2})+\operatorname{tr}(Z^{2})-2\operatorname{tr}(WZ)

is minimised when WW and ZZ commute, by the symmetric form of von Neumann’s trace inequality. Hence the nearest point may be taken in the eigenbasis of WW, and the matrix problem reduces to Euclidean projection of (λ1,,λn)(\lambda_{1},\dots,\lambda_{n}) onto the cone of vectors with equal adjacent pairs and final zero when nn is odd.

The orthogonal projection onto that linear constraint set is obtained by averaging each adjacent pair, which gives (4.31). Because the eigenvalues are ordered, these pair averages remain ordered and nonnegative, so the projected vector already lies in the admissible cone. This proves (4.32). Expanding the squared norm pair by pair gives

(λ2i1λ¯i)2+(λ2iλ¯i)2=12(λ2i1λ2i)2,(\lambda_{2i-1}-\bar{\lambda}_{i})^{2}+(\lambda_{2i}-\bar{\lambda}_{i})^{2}=\frac{1}{2}(\lambda_{2i-1}-\lambda_{2i})^{2},

and when nn is odd the final coordinate is projected to zero, contributing λn2\lambda_{n}^{2}. This yields (4.33). The final claim is immediate from Proposition 4.18.∎

{remarkbox}
Remark (Robust empirical certificate).

Define the paired-spectrum defect by

Dpair(W):=WPpair(W)F.D_{\mathrm{pair}}(W):=\lVert W-P_{\mathrm{pair}}(W)\rVert_{F}.

Distance to a closed set is 11-Lipschitz in Frobenius norm, so for any estimate W^\widehat{W} one has

|Dpair(W^)Dpair(W)|W^WF.\lvert D_{\mathrm{pair}}(\widehat{W})-D_{\mathrm{pair}}(W)\rvert\leq\lVert\widehat{W}-W\rVert_{F}.

Hence any certified lower bound on Dpair(W^)D_{\mathrm{pair}}(\widehat{W}) beyond estimation error is a robust witness that the visible correction does not lie in the same observed-dimension skew-square class. The defect is therefore the quantitative version of the binary obstruction in Proposition 4.18.

{remarkbox}
Remark (What is and is not closed).

Theorems 4.1 and 4.4, together with Proposition 4.18, show the correct closure picture. Exact quotienting preserves Gaussian precision geometry and the support-preserving attenuation class beneath a fixed tangent ceiling. It does not generically preserve the same observed-dimension Donsker-Varadhan skew-square class. The microscopic Donsker-Varadhan Hessian should therefore be regarded as the tangent ceiling and microscopic cone inside the larger quotient-visible class, not as the class closed by Schur elimination itself.

5  Hidden locality and graph-local structure

Section 4 showed that the quotient-visible object is produced by hidden mediation beneath a fixed tangent ceiling. The next question is spatial: if the upstairs precision is graph-local on the hidden sector, does the induced visible law respect that locality, or can Schur elimination generate arbitrary long-range coupling? The answer is no. Visible fill-in is organised by hidden connected components and is exponentially suppressed by hidden graph distance, with a universal rate determined by the hidden spectral window. The section closes by identifying corridor extremisers for this long-range transfer problem. Those extremisers belong to the abstract positive-cone locality theory developed here. Section 9 later studies a Markov corridor regime in the hidden-feedback ladder; it is inspired by the same geometry but is not the same statement.

5.1 Componentwise hidden mediation

Let V=VvisVhidV=V_{\mathrm{vis}}\oplus V_{\mathrm{hid}} and let

KX=(KVVKVHKHVKHH)SPD(V)K_{X}=\begin{pmatrix}K_{VV}&K_{VH}\\ K_{HV}&K_{HH}\end{pmatrix}\in\mathrm{SPD}(V) (5.1)

be a graph-local precision operator. In this Gaussian graphical-model setting, precision sparsity encodes conditional independence and Schur elimination creates visible fill-in [33, 34, 39]. The point is that this fill-in is not arbitrary. It is first split by hidden connected component, and only then can one ask how large the resulting visible coupling can be.

Theorem 5.1 (Hidden-component mediation).

The visible effective precision after hidden elimination is

Keff=KVVKVHKHH1KHV.K_{\mathrm{eff}}=K_{VV}-K_{VH}K_{HH}^{-1}K_{HV}. (5.2)

If the hidden graph decomposes into connected components H=αHαH=\bigsqcup_{\alpha}H_{\alpha} respected by KHHK_{HH}, then

KVHKHH1KHV=αKVHαKHαHα1KHαV.K_{VH}K_{HH}^{-1}K_{HV}=\sum_{\alpha}K_{VH_{\alpha}}K_{H_{\alpha}H_{\alpha}}^{-1}K_{H_{\alpha}V}. (5.3)

Consequently a visible pair can acquire a new coupling only if both visible coordinates connect to the same hidden component.

The decomposition in (5.3) is the Green-kernel or walk-sum mediation picture for hidden elimination [40, 41]. It is the componentwise version of the hidden-mediation mechanism from Section 4: locality is not lost at the level of support, even though fill-in becomes dense inside the mediated visible block.

Proof.

Equation (5.2) is the Schur complement formula. If the hidden graph splits into connected components respected by KHHK_{HH}, then after permuting indices one has

KHH=diag(KH1H1,,KHmHm),K_{HH}=\operatorname{diag}(K_{H_{1}H_{1}},\dots,K_{H_{m}H_{m}}),

so the inverse is block diagonal with the same decomposition. Substituting this into the Schur term yields (5.3). The last claim is immediate from the support structure of the sum. ∎

5.2 Intrinsic graph-local decay

Componentwise mediation is only the first locality statement. The sharper question is quantitative: once two visible channels are forced to communicate through a distant hidden region, how strongly can they couple? The next theorem gives the universal answer. It extends classical decay-of-inverse results for sparse positive matrices to the hidden-mediation setting relevant for quotient observation [42, 43, 44].

Proposition 5.2 (Graph-distance decay via polynomial approximation).

Let D0D\succ 0 be a hidden precision matrix supported on a hidden graph GHG_{H}, and suppose

spec(D)[α,β],0<α<β<.\operatorname{spec}(D)\subset[\alpha,\beta],\qquad 0<\alpha<\beta<\infty.

Let S,TS,T be hidden vertex sets with graph distance at least δ\delta, and define

Eδ(α,β):=infdegpδ1maxx[α,β]|1xp(x)|.E_{\delta}(\alpha,\beta):=\inf_{\deg p\leq\delta-1}\max_{x\in[\alpha,\beta]}\lvert\frac{1}{x}-p(x)\rvert. (5.4)

Then

PSD1PTopEδ(α,β).\|P_{S}D^{-1}P_{T}\|_{\mathrm{op}}\leq E_{\delta}(\alpha,\beta). (5.5)

Moreover, classical Chebyshev approximation yields constants Cdec(α,β)>0C_{\mathrm{dec}}(\alpha,\beta)>0 and

ρ:=κ1κ+1,κ:=β/α,\rho:=\frac{\sqrt{\kappa}-1}{\sqrt{\kappa}+1},\qquad\kappa:=\beta/\alpha,

for which

Eδ(α,β)Cdec(α,β)ρδ.E_{\delta}(\alpha,\beta)\leq C_{\mathrm{dec}}(\alpha,\beta)\,\rho^{\delta}. (5.6)
Proof.

Let pp be any polynomial of degree at most δ1\delta-1. Since DjD^{j} propagates only along hidden walks of length at most jj, one has

PSp(D)PT=0.P_{S}p(D)P_{T}=0.

Hence

PSD1PT=PS(D1p(D))PT,P_{S}D^{-1}P_{T}=P_{S}\bigl(D^{-1}-p(D)\bigr)P_{T},

so

PSD1PTopD1p(D)opmaxx[α,β]|1xp(x)|.\|P_{S}D^{-1}P_{T}\|_{\mathrm{op}}\leq\|D^{-1}-p(D)\|_{\mathrm{op}}\leq\max_{x\in[\alpha,\beta]}\lvert\frac{1}{x}-p(x)\rvert.

Taking the infimum over all such pp gives (5.5). The exponential estimate (5.6) is the standard Chebyshev-approximation consequence for 1/x1/x on [α,β][\alpha,\beta] [42, 45, 46]. ∎

Corollary 5.3 (Visible coupling decay).

Let bu,bvb_{u},b_{v} be visible-to-hidden coupling vectors supported on hidden sets at graph distance at least δ\delta. Then

|buTD1bv|bu2bv2Eδ(α,β)bu2bv2Cdec(α,β)ρδ.\lvert b_{u}^{T}D^{-1}b_{v}\rvert\leq\lVert b_{u}\rVert_{2}\,\lVert b_{v}\rVert_{2}\,E_{\delta}(\alpha,\beta)\leq\lVert b_{u}\rVert_{2}\,\lVert b_{v}\rVert_{2}\,C_{\mathrm{dec}}(\alpha,\beta)\,\rho^{\delta}. (5.7)
Proof.

Apply Proposition 5.2 and Cauchy-Schwarz. ∎

{remarkbox}
Remark (Locality as a visible prediction).

Corollary 5.3 is the headline locality statement of the programme-core theory. Once the hidden spectral window is controlled, long-range visible coupling is exponentially suppressed by hidden graph distance. This is a prediction about the visible object, not merely a structural statement about the upstairs operator.

5.3 Corridor extremisers and bundle structure

The Chebyshev bound gives a universal decay rate. The next theorem identifies the asymptotic graph shape that realises that rate. This is still an abstract statement about graph-local hidden precision geometry. The strong-driving corridor analysis in Section 9 concerns a specific hidden-feedback ladder and should not be conflated with the present extremiser theorem.

Proposition 5.4 (Corridor realisation of the universal exponential rate).

Let Pδ+1P_{\delta+1} be the path on δ+1\delta+1 hidden vertices and define the constant-coefficient corridor precision

Dδcorr:=cIdAPδ+1,c:=α+β2,d:=βα4.D_{\delta}^{\mathrm{corr}}:=cI-dA_{P_{\delta+1}},\qquad c:=\frac{\alpha+\beta}{2},\qquad d:=\frac{\beta-\alpha}{4}. (5.8)

Then spec(Dδcorr)[α,β]\operatorname{spec}(D_{\delta}^{\mathrm{corr}})\subset[\alpha,\beta], the endpoint distance is δ\delta, and the endpoint transfer obeys

(Dδcorr)1,δ+11=Ccorr(α,β)ρδ(1+o(1)),δ,\bigl(D_{\delta}^{\mathrm{corr}}\bigr)^{-1}_{1,\delta+1}=C_{\mathrm{corr}}(\alpha,\beta)\,\rho^{\delta}\,(1+o(1)),\qquad\delta\to\infty, (5.9)

for an explicit positive constant Ccorr(α,β)C_{\mathrm{corr}}(\alpha,\beta) and the same decay rate ρ=(κ1)/(κ+1)\rho=(\sqrt{\kappa}-1)/(\sqrt{\kappa}+1) as in Proposition 5.2. Consequently the one-dimensional corridor realises the universal exponential decay rate at the level of the exponent.

Proof.

The spectral inclusion for (5.8) follows from the path adjacency spectrum. The inverse of a constant-coefficient Jacobi chain is explicit, and its endpoint entry has the stated asymptotic form (5.9). Proposition 5.2 shows that no graph-local hidden precision with spectral window [α,β][\alpha,\beta] can decay more slowly than exponentially at rate ρδ\rho^{\delta}. Hence the corridor family realises the universal exponent. ∎

{remarkbox}
Remark (Rate optimality versus extremiser questions).

Proposition 5.4 is a rate-level statement. It identifies the exponential decay exponent and a corridor family that realises it. It does not prove a sharp finite-δ\delta minimax constant, and it does not prove the stronger many-channel threshold-count extremiser statement. Those questions remain open in the abstract locality problem. The corridor regime in Section 9 should therefore be read as a separate dynamical investigation built on the same rate-level geometry, not as a proof of full finite-distance optimality.

5.4 Scope of the current locality theory

The locality theory proved here has two parts. First, hidden mediation splits by connected component. Second, once the hidden spectral window is fixed, off-mask visible coupling is exponentially suppressed with graph distance, and the corridor family realises the universal decay exponent asymptotically. What is not proved here is a sharp finite-distance minimax constant or a full classification of graph extremisers beyond the corridor bundle. Adjacency-loss diagnostics and fill-in summaries are deferred to Appendix C.

6  Bell and temporal frontiers as law-level evidence

Sections 4 and 5 developed the internal geometry of Φ\Phi: hidden mediation, transport, conservation, and graph-local structure. The next question is evidential. Does the quotient-visible viewpoint detect genuine law-level structure that simpler summaries erase? On the Bell square the answer is yes. The visible datum is not merely a correlator table. It is a family of visible pair laws, and the right compatibility question is whether those pair laws arise as quotient marginals of one common visible Gaussian law. On that square the resulting frontier has two independent coordinates: variance consistency and the arcsine CHSH obstruction. Correlator-only summaries retain only the second.

6.1 Common visible gluing as a law-level compatibility problem

The Bell square is the first nontrivial test of the programme-core viewpoint because it asks for compatibility of several visible quotient outputs at once. The question is not whether each pair law is individually admissible. It is whether the four pair laws can be realised simultaneously as quotient marginals of one common law upstairs on the visible variables. That is the kind of compatibility problem the quotient-visible formalism is designed to express.

Definition 6.1 (Common Schur gluing of context families).

Let

QxySPD(2),x,y{0,1},Q_{xy}\in\mathrm{SPD}(2),\qquad x,y\in\{0,1\},

be four visible pair precisions, and let

Pxy:42P_{xy}:\mathbb{R}^{4}\to\mathbb{R}^{2}

select the coordinate pair (Ax,By)(A_{x},B_{y}) from (A0,A1,B0,B1)(A_{0},A_{1},B_{0},B_{1}). We say that the family (Qxy)(Q_{xy}) is commonly Schur-glued if there exists QSPD(4)Q_{\ast}\in\mathrm{SPD}(4) such that

Qxy=FPxy(Q)for all x,y{0,1}.Q_{xy}=F_{P_{xy}}(Q_{\ast})\qquad\text{for all }x,y\in\{0,1\}. (6.1)

Definition 6.1 is the Bell-square instance of quotient compatibility. It asks whether four visible pair laws sit on one common point of the positive cone after quotienting by the four coordinate projections. The next theorem shows that, on the Bell square, this compatibility problem collapses to two law-level conditions.

Theorem 6.2 (Bell-square collapse theorem).

Let

Qxy=(axybxybxydxy)SPD(2),Σxy:=Qxy1=(vxyAcxycxyvxyB),Q_{xy}=\begin{pmatrix}a_{xy}&b_{xy}\\ b_{xy}&d_{xy}\end{pmatrix}\in\mathrm{SPD}(2),\qquad\Sigma_{xy}:=Q_{xy}^{-1}=\begin{pmatrix}v^{A}_{xy}&c_{xy}\\ c_{xy}&v^{B}_{xy}\end{pmatrix},

and define

ρxy:=cxyvxyAvxyB=bxyaxydxy,ϕxy:=arcsin(ρxy).\rho_{xy}:=\frac{c_{xy}}{\sqrt{v^{A}_{xy}v^{B}_{xy}}}=\frac{-b_{xy}}{\sqrt{a_{xy}d_{xy}}},\qquad\phi_{xy}:=\arcsin(\rho_{xy}). (6.2)

Then the following are equivalent.

  1. 1.

    There exists a centred Gaussian law on (A0,A1,B0,B1)(A_{0},A_{1},B_{0},B_{1}) whose (Ax,By)(A_{x},B_{y}) marginals are exactly the pair laws with covariances Σxy\Sigma_{xy}. In the positive definite case this is equivalent to common Schur gluing in the sense of Definition 6.1.

  2. 2.

    The family satisfies remote-setting variance consistency,

    vx0A=vx1A(x=0,1),v0yB=v1yB(y=0,1),v^{A}_{x0}=v^{A}_{x1}\quad(x=0,1),\qquad v^{B}_{0y}=v^{B}_{1y}\quad(y=0,1), (6.3)

    and the four arcsine CHSH inequalities

    |ϕ00+ϕ01+ϕ10ϕ11|π,|\phi_{00}+\phi_{01}+\phi_{10}-\phi_{11}|\leq\pi, (6.4)
    |ϕ00+ϕ01ϕ10+ϕ11|π,|\phi_{00}+\phi_{01}-\phi_{10}+\phi_{11}|\leq\pi, (6.5)
    |ϕ00ϕ01+ϕ10+ϕ11|π,|\phi_{00}-\phi_{01}+\phi_{10}+\phi_{11}|\leq\pi, (6.6)
    |ϕ00+ϕ01+ϕ10+ϕ11|π.|-\phi_{00}+\phi_{01}+\phi_{10}+\phi_{11}|\leq\pi. (6.7)

    Equivalently, with

    Exy:=2πϕxy=2πarcsin(bxyaxydxy),E_{xy}:=\frac{2}{\pi}\phi_{xy}=\frac{2}{\pi}\arcsin\!\Bigl(\frac{-b_{xy}}{\sqrt{a_{xy}d_{xy}}}\Bigr), (6.8)

    common gluing is equivalent to variance consistency together with Bell-locality of the lifted correlator table E=(Exy)E=(E_{xy}).

Proof.

Appendix A isolates the Gaussian gluing criterion and then specialises the Bell square using the standard arcsine lift. The new point for the present paper is structural: the quotient-visible compatibility problem is not exhausted by correlators. On the Bell square the full visible law contributes the diagonal variance-gluing constraints (6.3) and the lifted CHSH constraints (6.4)-(6.7). ∎

The theorem should be read as support for the programme-core theory, not as an isolated Bell observation. Sections 2-4 say that visible objects must be compared at law level, because quotient observation lives on the positive cone and composes by Schur transport. The Bell square tests that claim in the first genuinely constrained multi-context setting. The answer is rigid: the compatibility frontier is two-coordinate from the outset.

6.2 Bell-square frontier and strict refinement beyond Bell-locality

The Bell-local shadow detects only one part of the frontier from Theorem 6.2. The variance sector is a distinct obstruction, and it is invisible to correlator-only summaries.

Proposition 6.3 (Strict refinement over Bell-locality).

Bell-locality of the lifted correlator table EE is necessary but not sufficient for common visible Gaussian gluing of the full pair laws.

Proof.

Consider

Q00=(1001),Q01=(1/4001),Q10=Q11=(1001).Q_{00}=\begin{pmatrix}1&0\\ 0&1\end{pmatrix},\qquad Q_{01}=\begin{pmatrix}1/4&0\\ 0&1\end{pmatrix},\qquad Q_{10}=Q_{11}=\begin{pmatrix}1&0\\ 0&1\end{pmatrix}.

Then every off-diagonal entry vanishes, so (6.8) gives Exy=0E_{xy}=0 for all x,yx,y, hence the lifted correlator table is Bell-local. But

Q001=(1001),Q011=(4001),Q_{00}^{-1}=\begin{pmatrix}1&0\\ 0&1\end{pmatrix},\qquad Q_{01}^{-1}=\begin{pmatrix}4&0\\ 0&1\end{pmatrix},

so the variance of A0A_{0} depends on Bob’s setting. The variance-consistency conditions (6.3) therefore fail, and no common visible Gaussian gluing exists. ∎

{remarkbox}
Remark (Two Bell-square obstructions).

For a Bell-square family, define

εvar:=max{|v00Av01A|,|v10Av11A|,|v00Bv10B|,|v01Bv11B|},\varepsilon_{\mathrm{var}}:=\max\!\bigl\{|v^{A}_{00}-v^{A}_{01}|,|v^{A}_{10}-v^{A}_{11}|,|v^{B}_{00}-v^{B}_{10}|,|v^{B}_{01}-v^{B}_{11}|\bigr\}, (6.9)

and let εCHSH\varepsilon_{\mathrm{CHSH}} be the excess of the largest left-hand side of (6.4)-(6.7) above π\pi, truncated below at zero. Then common gluing on the Bell square is equivalent to the simultaneous vanishing of both obstructions,

εvar=0,εCHSH=0.\varepsilon_{\mathrm{var}}=0,\qquad\varepsilon_{\mathrm{CHSH}}=0.

This packages the Bell-square frontier as a two-coordinate compatibility problem: one coordinate is invisible to Bell correlators, while the other is the usual arcsine CHSH obstruction.

Corollary 6.4 (Bell cube normal form).

Let SS be the 4×44\times 4 matrix whose rows are the four CHSH sign vectors

(1,1,1,1),(1,1,1,1),(1,1,1,1),(1,1,1,1),(1,1,1,-1),\qquad(1,1,-1,1),\qquad(1,-1,1,1),\qquad(-1,1,1,1),

and define lifted Bell coordinates

y:=1πSϕ,ϕ:=(ϕ00,ϕ01,ϕ10,ϕ11).y:=\frac{1}{\pi}S\phi,\qquad\phi:=(\phi_{00},\phi_{01},\phi_{10},\phi_{11})^{\top}.

Then the Bell-compatible region in arcsine coordinates is exactly the cube

|yi|1,i=1,,4.|y_{i}|\leq 1,\qquad i=1,\dots,4.

Equivalently, the four CHSH inequalities are the coordinate inequalities of one global hypercubic normal form. In particular, Euclidean nearest-point repair in yy is coordinatewise clipping, and the Bell support function is

h(u)=π4Su1.h_{\mathcal{B}}(u)=\frac{\pi}{4}\,\|Su\|_{1}.

Appendix A records the derivation and the exact repair formulas.

Corollary 6.5 (Single-readout CHSH locality).

Suppose a Bell-context family (Qxy)(Q_{xy}) is commonly Schur-glued, and let

Z=(ZA0,ZA1,ZB0,ZB1)N(0,Q1)Z=(Z_{A_{0}},Z_{A_{1}},Z_{B_{0}},Z_{B_{1}})\sim N(0,Q_{\ast}^{-1})

for some QQ_{\ast} satisfying (6.1). Let

Ax=fx(ZAx),By=gy(ZBy),|fx|1,|gy|1.A_{x}=f_{x}(Z_{A_{x}}),\qquad B_{y}=g_{y}(Z_{B_{y}}),\qquad|f_{x}|\leq 1,\quad|g_{y}|\leq 1.

Then the correlators

E~xy:=𝔼[AxBy]\widetilde{E}_{xy}:=\mathbb{E}[A_{x}B_{y}]

obey the CHSH bound

|E~00+E~01+E~10E~11|2,\bigl|\widetilde{E}_{00}+\widetilde{E}_{01}+\widetilde{E}_{10}-\widetilde{E}_{11}\bigr|\leq 2, (6.10)

and likewise for the other three sign choices with one minus sign.

Proof.

All four outputs are measurable functions of the single common random vector ZZ. Hence for every realisation one has

|A0(B0+B1)+A1(B0B1)||B0+B1|+|B0B1|2,\bigl|A_{0}(B_{0}+B_{1})+A_{1}(B_{0}-B_{1})\bigr|\leq|B_{0}+B_{1}|+|B_{0}-B_{1}|\leq 2,

because |Ax|1|A_{x}|\leq 1 and |By|1|B_{y}|\leq 1. Taking expectations gives (6.10), and the other sign choices follow by relabelling. ∎

6.3 Why the quotient-visible perspective sees more than correlators

The Bell-facing conclusion is now sharper than a CHSH guardrail. Common visible Gaussian gluing on the Bell square is a law-level compatibility problem. Bell correlators detect only the arcsine shadow of that problem, whereas the quotient-visible formalism keeps the full pair law and therefore keeps the variance sector as well. Proposition 6.3 proves that this extra sector is not cosmetic. Two families can have identical Bell-local correlator shadow and still differ on the existence of a common quotient-visible law.

This is the kind of evidence the paper needs at this stage. Theorem 6.2 does not merely add another reformulation of Bell-locality. It shows that the intrinsic visible variable from Section 2 resolves frontier structure that correlator compression destroys. The Bell square is therefore a genuine law-level stress test for Φ\Phi. The passage from pair laws to correlators is a further readout layer, and it loses one of the two compatibility coordinates. The quotient-visible perspective sees more because it works before that readout collapse.

Corollary 6.5 then recovers the operational statement inside the fuller law-level picture. Once common gluing exists, every single bounded local readout sits under the classical CHSH bound. The usual guardrail is therefore recovered as a downstream shadow of common visible gluing, not as the primary object.

6.4 Temporal frontier

The same compatibility question can be asked on an observation graph of times rather than Bell settings. One specifies visible pair laws on the edges of a time-indexed graph and asks whether they admit one common Gaussian law whose edge marginals realise the prescribed family. Trees have only repeated-marginal consistency, whereas the first genuinely temporal clique already introduces a nontrivial law-level obstruction. Appendix A records the first fully observed temporal case and its sign-shadow interpretation. We do not develop a full temporal theory in the main text. The point here is only structural: Bell and temporal frontiers are two graph-indexed instances of one quotient-visible gluing problem.

7  Exact symmetry and the hidden response carrier

We now turn from the abstract quotient-visible theory to the controlled hidden-feedback ladder family. The visible variable is the activity a{0,1}a\in\{0,1\}, the hidden variable is the memory level m{0,,M}m\in\{0,\dots,M\}, and the observer sees only the activity projection. The question is the first one worth asking once the abstract theory is in place: does the intrinsic visible object Φ\Phi ever close in a completely rigid way inside a genuine nonequilibrium model? At h=0h=0 and λ=0\lambda=0 the answer is yes. A discrete symmetry forces an exact eigenmode, the visible line becomes an exact eigenline of the reduced conjugated operator, and the scalar visible algebra collapses to one parameter.

7.1 The exact eigenmode at λ=0\lambda=0

Write the ladder generator in the split form

Q=α(Qvis+εQmem),Q=\alpha\bigl(Q_{\mathrm{vis}}+\varepsilon Q_{\mathrm{mem}}\bigr), (7.1)

where QvisQ_{\mathrm{vis}} changes activity and QmemQ_{\mathrm{mem}} changes memory only. At h=0h=0 and λ=0\lambda=0 the visible flip rates are symmetric, so the lumped visible chain has rates β0=β1=α\beta_{0}=\beta_{1}=\alpha. Define the activity sign vector

u(a,m):=𝟏{a=0}𝟏{a=1}.u(a,m):=\mathbf{1}_{\{a=0\}}-\mathbf{1}_{\{a=1\}}. (7.2)

This vector is constant along each memory fibre and records only the visible activity parity.

Theorem 7.1 (Exact symmetry at the symmetric point).

Consider the hidden-feedback ladder at h=0h=0 and λ=0\lambda=0, with scalar visible observation given by activity. Then the following statements hold exactly for every finite MM and every finite ε\varepsilon.

  1. (i)

    The activity sign vector uu satisfies

    Qu=2αu.Qu=-2\alpha u. (7.3)
  2. (ii)

    In the visible-first reduced tangent basis, the visible line is an exact right eigenline of the reduced conjugated generator with eigenvalue 2α-2\alpha.

  3. (iii)

    The quotient-visible algebraic precision satisfies

    Φ=α.\Phi=\alpha. (7.4)
  4. (iv)

    Writing F0F_{0} for the reversible visible backbone, W:=ΦF0W:=\Phi-F_{0} for the irreversible correction, and TT for the scalar tangent load on the visible line, one has

    v𝖳H0v=α,Wα=F0T.v^{\mathsf{T}}H_{0}v=\alpha,\qquad W\alpha=F_{0}T. (7.5)
Proof.

Memory moves preserve activity and therefore preserve the sign vector, so Qmemu=0Q_{\mathrm{mem}}u=0. At h=0h=0 and λ=0\lambda=0, every visible flip changes the sign and occurs at rate α\alpha, hence Qvisu=2uQ_{\mathrm{vis}}u=-2u. Multiplying by the prefactor in (7.1) gives (7.3). The reduction to the visible-first tangent basis preserves the visible line generated by the activity mode, so the induced reduced operator has the same visible eigenvalue. In scalar visible rank, the generator-level Schur identity from Section 3.3 identifies 2Φ2\Phi with the visible Schur complement of Lred-L_{\mathrm{red}}. Because the visible line is exact and carries eigenvalue 2α-2\alpha, that Schur complement equals 2α2\alpha, which gives (7.4). The identities in (7.5) are then the scalar Schur relations for the decomposition of the reduced conjugated operator into reversible backbone plus skew correction. ∎

The theorem is the centre of Part III. Nothing asymptotic has happened yet. The visible clock is already pinned to a constant, and the remaining freedom is only in how that fixed total precision is split between reversible and irreversible sectors.

Corollary 7.2 (Single-parameter reduction and frozen clock).

On the slice h=0h=0 and λ=0\lambda=0, the scalar visible algebra is determined by the single parameter T(ε,M)T(\varepsilon,M). More precisely,

F0=α2T+α,W=αTT+α,F0+W=α.F_{0}=\frac{\alpha^{2}}{T+\alpha},\qquad W=\frac{\alpha T}{T+\alpha},\qquad F_{0}+W=\alpha. (7.6)

Consequently Φ=α\Phi=\alpha is frozen across all ε\varepsilon and MM, while F0F_{0} decreases and WW increases monotonically as functions of TT.

Proof.

By Theorem 7.1, one has Φ=α\Phi=\alpha and Wα=F0TW\alpha=F_{0}T. Together with the exact conservation split from Theorem 4.17, namely F0+W=ΦF_{0}+W=\Phi, this gives

(αF0)α=F0T.(\alpha-F_{0})\alpha=F_{0}T.

Solving for F0F_{0} and then substituting into W=αF0W=\alpha-F_{0} yields (7.6). The monotonicity statements are immediate from

dF0dT=α2(T+α)2<0,dWdT=α2(T+α)2>0.\frac{dF_{0}}{dT}=-\frac{\alpha^{2}}{(T+\alpha)^{2}}<0,\qquad\frac{dW}{dT}=\frac{\alpha^{2}}{(T+\alpha)^{2}}>0.

Remark (Trading segment and corridor endpoint).

Corollary 7.2 puts every point on the symmetric λ=0\lambda=0 slice onto the line segment F0+W=αF_{0}+W=\alpha. The equilibrium endpoint is (F0,W)=(α,0)(F_{0},W)=(\alpha,0). Section 9 shows that the strong-corridor endpoint is (α/(M+1),αM/(M+1))(\alpha/(M+1),\alpha M/(M+1)). The total visible precision does not move. Only its internal partition moves.

Remark (Why the eigenmode exists).

The mechanism behind Theorem 7.1 is a 2\mathbb{Z}_{2} activity-exchange symmetry. At h=0h=0 and λ=0\lambda=0, exchanging the two activity classes leaves the generator invariant and makes the sign representation one-dimensional. The mode uu is therefore forced, not guessed. This is also the reason the phenomenon transfers to any binary-visible model whose generator has the same activity-exchange symmetry.

7.2 The visible-first Schur reduction

The previous theorem identifies the correct visible line. Once that line is fixed, the correct reduced basis is forced: first the true visible tangent vector, then an orthonormal basis of its hidden complement. The point is structural, not cosmetic. The first-correction analysis lives in this basis because only in this basis does the visible eigenline become a block constraint.

Let Lred(λ)L_{\mathrm{red}}(\lambda) denote the reduced conjugated tangent operator in a visible-first orthonormal basis, and write its block form as

Lred(λ)=(a(λ)r(λ)𝖳c(λ)(λ)),L_{\mathrm{red}}(\lambda)=\begin{pmatrix}a(\lambda)&r(\lambda)^{\mathsf{T}}\\ c(\lambda)&\mathcal{H}(\lambda)\end{pmatrix}, (7.7)

where the first coordinate is the visible line and the remaining coordinates form the hidden complement.

Proposition 7.3 (Visible-first Schur reduction at λ=0\lambda=0).

For arbitrary field hh, provided λ=0\lambda=0, the visible line is the exact tangent line of the lumped two-state visible chain and is an exact right eigenline of the reduced conjugated generator. Equivalently,

Lred(0)=(a0r0𝖳00),a0=(β0+β1).L_{\mathrm{red}}(0)=\begin{pmatrix}a_{0}&r_{0}^{\mathsf{T}}\\ 0&\mathcal{H}_{0}\end{pmatrix},\qquad a_{0}=-(\beta_{0}+\beta_{1}). (7.8)

In particular, the lower-left block vanishes exactly, so all hidden-to-visible correction passes through the single Schur channel determined by r0r_{0}, 0\mathcal{H}_{0}, and the derivative of the lower-left block.

Proof.

Exact lumpability at λ=0\lambda=0 identifies the true visible tangent direction with the activity mode of the two-state visible chain. Writing the reduced conjugated operator in a basis whose first vector spans that line, the eigenline condition means exactly that the image of the first basis vector has no hidden-complement component. This is equivalent to c(0)=0c(0)=0, which yields the block upper-triangular form (7.8). The visible scalar block is the negative total visible escape rate of the lumped chain, namely (β0+β1)-(\beta_{0}+\beta_{1}). ∎

Proposition 7.3 is the basis theorem for the correction layer. It explains why the naive odd-pair basis is not the right global coordinate system for the fast-memory expansion. The visible object responds through the true visible tangent line, not through an arbitrary parity chart. Section 8 uses this exact block form as the starting point for the first-correction expansion.

7.3 The canonical hidden response carrier

Once the visible-first block form is exact, the first hidden derivative that can influence the visible Schur coefficient is forced. There is only one scalar contraction left.

Theorem 7.4 (Canonical hidden response carrier).

Assume λ=0\lambda=0 and write the visible-first reduced operator as in (7.7), with c(0)=0c(0)=0 as in Proposition 7.3. Then the odd hidden contribution to the first derivative of the scalar visible Schur coefficient is carried by the single scalar

Jhid:=ε2r0𝖳01c(0).J_{\mathrm{hid}}:=-\frac{\varepsilon}{2}\,r_{0}^{\mathsf{T}}\mathcal{H}_{0}^{-1}c^{\prime}(0). (7.9)

Equivalently, all competing hidden derivative channels are killed by the exact upper-triangular reduction at λ=0\lambda=0.

Moreover, once the visible line is fixed, JhidJ_{\mathrm{hid}} is invariant under arbitrary orthogonal changes of hidden complement. Thus JhidJ_{\mathrm{hid}} is canonical inside the visible-first Schur setting.

Proof.

For scalar visible rank, the visible Schur coefficient of (7.7) is

S(λ)=a(λ)r(λ)𝖳(λ)1c(λ).S(\lambda)=a(\lambda)-r(\lambda)^{\mathsf{T}}\mathcal{H}(\lambda)^{-1}c(\lambda). (7.10)

Differentiating at λ=0\lambda=0 and using c(0)=0c(0)=0 gives

S(0)=a(0)r0𝖳01c(0).S^{\prime}(0)=a^{\prime}(0)-r_{0}^{\mathsf{T}}\mathcal{H}_{0}^{-1}c^{\prime}(0). (7.11)

Every term involving r(0)r^{\prime}(0), (0)\mathcal{H}^{\prime}(0), or derivatives of the inverse multiplied by c(0)c(0) vanishes. The only hidden contraction that survives is therefore r0𝖳01c(0)r_{0}^{\mathsf{T}}\mathcal{H}_{0}^{-1}c^{\prime}(0). The normalization in (7.9) is the one natural for the ladder scaling. For canonicality, let OO be an orthogonal change of basis on the hidden complement. Then

r0𝖳r0𝖳O𝖳,0O0O𝖳,c(0)Oc(0),r_{0}^{\mathsf{T}}\mapsto r_{0}^{\mathsf{T}}O^{\mathsf{T}},\qquad\mathcal{H}_{0}\mapsto O\mathcal{H}_{0}O^{\mathsf{T}},\qquad c^{\prime}(0)\mapsto Oc^{\prime}(0),

so the scalar contraction is unchanged:

r0𝖳O𝖳(O0O𝖳)1Oc(0)=r0𝖳01c(0).r_{0}^{\mathsf{T}}O^{\mathsf{T}}(O\mathcal{H}_{0}O^{\mathsf{T}})^{-1}Oc^{\prime}(0)=r_{0}^{\mathsf{T}}\mathcal{H}_{0}^{-1}c^{\prime}(0).

This proves both claims. ∎

Remark (Meaning of canonical).

The word “canonical” is used here in a precise and limited sense. The scalar JhidJ_{\mathrm{hid}} is not a basis-free universal observable on every reduced model. It is canonical once the visible line has been fixed and the reduction is written in the visible-first Schur basis forced by Proposition 7.3. Inside that setting there is exactly one hidden derivative contraction, and it is invariant under all residual orthogonal freedom.

7.4 What this does and does not solve

Section 7 solves the exact algebraic centre of the correction analysis at λ=0\lambda=0. It identifies the correct reduction basis, proves that the visible precision freezes to Φ=α\Phi=\alpha on the symmetric slice, and collapses the scalar visible algebra to the single function T(ε,M)T(\varepsilon,M). What it does not solve is equally important. It does not show that the eigenmode or the identity Φ=α\Phi=\alpha survive when h0h\neq 0 or λ0\lambda\neq 0, it does not determine the fast-memory obstruction, and it does not explain the corridor regime. Those are the jobs of Sections 8 and 9. The mechanistic Woodbury termination behind the multiplicative identity remains open even though the algebraic identity itself is proved. Finally, the canonical carrier identified here is shown in Section 8 to be the unique survivor among the plausible first-correction reduction routes.

8  Fast-memory response and thermodynamic constraints

The exact carrier from Section 7 answers the symmetry question at the algebraic centre. The next question is asymptotic. When hidden memory equilibrates much faster than the visible activity flips, what visible law survives, and how does hidden nonequilibrium re-enter at the first nontrivial order? The answer has two parts. First, the visible law homogenises to a two-state chain, so the leading visible precision is completely explicit. Second, the first correction already remembers hidden geometry through one Schur channel, and that channel comes with both a source law and a sharp list of failures of the obvious simplifications.

8.1 Fast-memory homogenisation

Write ka1a(m)k_{a\to 1-a}(m) for the visible flip rate out of activity aa at memory level mm, and let νa\nu_{a} denote the stationary law of the pure memory dynamics on the fibre with activity fixed to aa. The corresponding homogenised visible exit rates are

βa:=m=0Mνa(m)ka1a(m),a{0,1}.\beta_{a}:=\sum_{m=0}^{M}\nu_{a}(m)\,k_{a\to 1-a}(m),\qquad a\in\{0,1\}. (8.1)

These are the rates seen after the memory sector has fully mixed before the next visible jump.

Proposition 8.1 (Fast-memory homogenisation).

Fix finite MM and fixed parameters (μ,λ,h)(\mu,\lambda,h). As ε\varepsilon\to\infty, the visible activity process homogenises to a two-state continuous-time Markov chain with rates β0\beta_{0} and β1\beta_{1} from (8.1). In particular, the leading visible dwell law is exponential in each activity sector.

Proof.

This is the standard fast-memory timescale-separation mechanism, used here as a verified asymptotic input rather than as a standalone homogenisation proof. At timescale ε1\varepsilon^{-1} the memory generator relaxes inside each activity fibre before a visible flip typically occurs. The visible jump hazard therefore averages against the fibre equilibrium νa\nu_{a}, which yields the effective exit rates βa\beta_{a}. Once those rates are fixed, the homogenised visible law is the two-state chain with generator

Qhom=(β0β0β1β1).Q_{\mathrm{hom}}=\begin{pmatrix}-\beta_{0}&\beta_{0}\\ \beta_{1}&-\beta_{1}\end{pmatrix}.

The exponential visible dwell law is then immediate. ∎

The first point of contact with the quotient-visible theory is that the homogenised limit is already scalar-visible, so the visible precision can be read off directly.

Corollary 8.2 (Homogenised visible precision).

For the homogenised two-state chain from Proposition 8.1,

Φhom=β0+β12.\Phi_{\mathrm{hom}}=\frac{\beta_{0}+\beta_{1}}{2}. (8.2)

Moreover, along the ladder family,

ΦΦhom,W0,ε.\Phi\to\Phi_{\mathrm{hom}},\qquad W\to 0,\qquad\varepsilon\to\infty. (8.3)

Thus the irreversible contribution is subleading in the fast-memory limit.

Proof.

For a two-state visible chain with rates aa and bb, the scalar visible Schur computation gives Φ=(a+b)/2\Phi=(a+b)/2. Applying this to QhomQ_{\mathrm{hom}} proves (8.2). The convergence statement is the visible consequence of Proposition 8.1: once the visible law converges to the homogenised two-state chain, the scalar visible precision converges to its exact two-state value, while the hidden irreversible correction disappears at leading order. ∎

The basis theorem from Section 7 is already active here. The correct asymptotic basis is not an arbitrary parity chart. It is the visible-first basis forced by Proposition 7.3, because that basis keeps the true visible tangent line fixed while the hidden block diverges.

8.2 First-correction structure

The homogenised limit is too coarse to explain how hidden nonequilibrium first re-enters the visible precision. That information appears one order later. The visible-first basis from Section 7 is the right coordinate system because it separates scalar visible drift from hidden-mediated feedback before any asymptotic truncation is taken.

The first object that enters is the correct entry law for a visible dwell. If the process is about to enter activity aa, it does not enter according to the within-activity equilibrium νa\nu_{a}. It enters according to jump-weighted mass coming from the opposite activity.

Proposition 8.3 (Leading fast-memory entry law).

Define

ηa(m):=ν1a(m)k1aa(m)β1a,a{0,1}.\eta_{a}(m):=\frac{\nu_{1-a}(m)\,k_{1-a\to a}(m)}{\beta_{1-a}},\qquad a\in\{0,1\}. (8.4)

Then ηa\eta_{a} is the leading fast-memory entry law for dwells in activity aa in the fast-memory asymptotic regime. In particular, the exact entry law differs from ηa\eta_{a} by O(ε1)O(\varepsilon^{-1}), and at fixed (M,μ,λ)(M,\mu,\lambda) the law ηa\eta_{a} is independent of the uniform field hh.

Proof.

A dwell in activity aa begins with a jump from the opposite activity, so the entering memory distribution is weighted by the source equilibrium ν1a\nu_{1-a} multiplied by the jump hazard into aa. Normalisation by the total inflow rate βa\beta_{a} gives (8.4). The O(ε1)O(\varepsilon^{-1}) correction is the usual first transient defect before complete fibre mixing. The field-independence is a normalisation cancellation: the uniform field multiplies both numerator and denominator in the same way and therefore drops out of the leading ratio. ∎

The next input is spectral. Let Ta,ε=εGadiag(ka1a)T_{a,\varepsilon}=\varepsilon G_{a}-\operatorname{diag}(k_{a\to 1-a}) denote the killed memory operator in activity sector aa.

Proposition 8.4 (Principal eigenvalue shift).

For each activity sector,

λmax(Ta,ε)=βa+ceig,aε+o(ε1),ε.\lambda_{\max}(T_{a,\varepsilon})=-\beta_{a}+\frac{c_{\mathrm{eig},a}}{\varepsilon}+o(\varepsilon^{-1}),\qquad\varepsilon\to\infty. (8.5)

The first correction to the visible mean dwell is therefore not purely an effective-rate effect: the leading eigenvalue shift is only one contribution to the full first-order visible correction.

Proof.

At leading order the operator εGa\varepsilon G_{a} mixes to the fibre equilibrium, so the killed generator sees only the averaged hazard βa\beta_{a}. Standard first-order spectral perturbation around that averaged hazard gives (8.5). The final sentence records that the entry-law and transient-relaxation terms survive at the same order, so the eigenvalue shift alone does not close the visible correction. ∎

The visible-first Schur basis now exposes the full first coefficient. Write the reduced conjugated operator of L-L in that basis as

Lred,ε=(2Φhom+a1ε1+o(ε1)r0𝖳+o(1)c0+o(1)ε1+o(ε)).-L_{\mathrm{red},\varepsilon}=\begin{pmatrix}2\Phi_{\mathrm{hom}}+a_{1}\varepsilon^{-1}+o(\varepsilon^{-1})&r_{0}^{\mathsf{T}}+o(1)\\ c_{0}+o(1)&\varepsilon\mathcal{H}_{1}+o(\varepsilon)\end{pmatrix}. (8.6)

The hidden block diverges like ε\varepsilon, but the visible line stays fixed. This is precisely why the Schur feedback survives at order ε1\varepsilon^{-1}.

Theorem 8.5 (First fast-memory correction in visible-first form).

Assume the expansion (8.6). Then the scalar visible precision satisfies

ΦhomΦ=12ε[a1+r0𝖳11c0]+o(ε1).\Phi_{\mathrm{hom}}-\Phi=\frac{1}{2\varepsilon}\Bigl[-a_{1}+r_{0}^{\mathsf{T}}\mathcal{H}_{1}^{-1}c_{0}\Bigr]+o(\varepsilon^{-1}). (8.7)

Thus the first visible correction splits into a scalar drift term and a hidden-mediated Schur term. At λ=0\lambda=0, the second term is exactly the fast-memory manifestation of the canonical hidden carrier from Theorem 7.4.

Proof.

For scalar visible rank, Section 3.3 identifies 2Φ2\Phi with the visible Schur complement of Lred,ε-L_{\mathrm{red},\varepsilon}. Applying the scalar Schur formula to (8.6) gives

2Φ=2Φhom+a1ε1r0𝖳(ε1)1c0+o(ε1).2\Phi=2\Phi_{\mathrm{hom}}+a_{1}\varepsilon^{-1}-r_{0}^{\mathsf{T}}(\varepsilon\mathcal{H}_{1})^{-1}c_{0}+o(\varepsilon^{-1}).

Since (ε1)1=ε111(\varepsilon\mathcal{H}_{1})^{-1}=\varepsilon^{-1}\mathcal{H}_{1}^{-1}, rearranging yields (8.7). The identification with the carrier from Section 7 is exactly the statement that the only hidden-mediated channel surviving in visible-first coordinates is the canonical Schur contraction. ∎

Equation (8.7) is the technical centre of the section. It shows why the first correction cannot be read from homogenised rates alone. The visible coefficient remembers hidden resolvent geometry through the single Schur channel r0𝖳11c0r_{0}^{\mathsf{T}}\mathcal{H}_{1}^{-1}c_{0}.

8.3 Source law and obstruction

We now specialise to the symmetric coupling slice λ=0\lambda=0, where the activity-swap involution is exact. Section 7 isolated the canonical hidden carrier JhidJ_{\mathrm{hid}}. The present question is how that carrier varies with the field hh in the fast-memory regime.

Theorem 8.6 (Parity and exact perturbation decomposition).

Assume λ=0\lambda=0 and fix the visible-first basis from Proposition 7.3. Write

r(h)=r0+Δr(h),ch=c(0)+Δc(h),(h)=0+Δ(h),r(h)=r_{0}+\Delta r(h),\qquad c^{\prime}_{h}=c^{\prime}(0)+\Delta c(h),\qquad\mathcal{H}(h)=\mathcal{H}_{0}+\Delta\mathcal{H}(h),

and let

R(h):=(h)101.R(h):=\mathcal{H}(h)^{-1}-\mathcal{H}_{0}^{-1}.

Then the canonical hidden carrier

Jhid(h):=ε2r(h)𝖳(h)1chJ_{\mathrm{hid}}(h):=-\frac{\varepsilon}{2}\,r(h)^{\mathsf{T}}\mathcal{H}(h)^{-1}c^{\prime}_{h}

is an even function of hh. The normalised datum

J(h):=Jhid(h)1+cosh(h)J_{*}(h):=\frac{J_{\mathrm{hid}}(h)}{1+\cosh(h)} (8.8)

is also even. Moreover, the field defect

ΔJhid:=Jhid(h)Jhid(0)\Delta J_{\mathrm{hid}}:=J_{\mathrm{hid}}(h)-J_{\mathrm{hid}}(0)

admits the exact decomposition

ΔJhid=Tr+Tc+TH+Tmix,\Delta J_{\mathrm{hid}}=T_{r}+T_{c}+T_{H}+T_{\mathrm{mix}}, (8.9)

where

Tr\displaystyle T_{r} :=ε2(Δr)𝖳01c(0),\displaystyle:=-\frac{\varepsilon}{2}\,(\Delta r)^{\mathsf{T}}\mathcal{H}_{0}^{-1}c^{\prime}(0), (8.10)
Tc\displaystyle T_{c} :=ε2r0𝖳01Δc,\displaystyle:=-\frac{\varepsilon}{2}\,r_{0}^{\mathsf{T}}\mathcal{H}_{0}^{-1}\Delta c, (8.11)
TH\displaystyle T_{H} :=ε2r0𝖳R(h)c(0),\displaystyle:=-\frac{\varepsilon}{2}\,r_{0}^{\mathsf{T}}R(h)c^{\prime}(0), (8.12)

and

Tmix:=\displaystyle T_{\mathrm{mix}}:={} ε2[(Δr)𝖳01Δc+(Δr)𝖳R(h)c(0)+r0𝖳R(h)Δc+(Δr)𝖳R(h)Δc].\displaystyle-\frac{\varepsilon}{2}\Bigl[(\Delta r)^{\mathsf{T}}\mathcal{H}_{0}^{-1}\Delta c+(\Delta r)^{\mathsf{T}}R(h)c^{\prime}(0)+r_{0}^{\mathsf{T}}R(h)\Delta c+(\Delta r)^{\mathsf{T}}R(h)\Delta c\Bigr]. (8.13)

Here TrT_{r} is row-tail drift, TcT_{c} is input-channel drift, THT_{H} is hidden-resolvent drift, and TmixT_{\mathrm{mix}} collects the mixed interaction terms.

Proof.

The evenness is the activity-swap symmetry from Section 7: replacing hh by h-h exchanges the two activity classes while leaving the visible-first scalar contraction invariant, so Jhid(h)=Jhid(h)J_{\mathrm{hid}}(h)=J_{\mathrm{hid}}(-h). Since 1+cosh(h)1+\cosh(h) is itself even, the same holds for J(h)J_{*}(h).

For the decomposition, expand

r(h)𝖳(h)1ch=(r0+Δr)𝖳(01+R(h))(c(0)+Δc)r(h)^{\mathsf{T}}\mathcal{H}(h)^{-1}c^{\prime}_{h}=\bigl(r_{0}+\Delta r\bigr)^{\mathsf{T}}\bigl(\mathcal{H}_{0}^{-1}+R(h)\bigr)\bigl(c^{\prime}(0)+\Delta c\bigr)

and subtract the h=0h=0 contribution r0𝖳01c(0)r_{0}^{\mathsf{T}}\mathcal{H}_{0}^{-1}c^{\prime}(0). Grouping the surviving terms by whether the perturbation enters through the row, the input channel, the hidden resolvent, or a mixed product yields (8.9) with (8.10)-(8.13). ∎

The point of Theorem 8.6 is structural. There is a clean source law, but there is also a genuine obstruction. After normalisation by 1+cosh(h)1+\cosh(h), the carrier becomes asymptotically field-blind at leading fast-memory order, yet not exactly field-blind at finite ε\varepsilon.

Proposition 8.7 (Asymptotic source law and obstruction class).

Assume λ=0\lambda=0. Then in the fast-memory regime,

J(h)=J(0)+O(cosh(h)1ε),J_{*}(h)=J_{*}(0)+O\!\left(\frac{\cosh(h)-1}{\varepsilon}\right), (8.14)

and hence

J(h)J(0)=O(h2ε)(h0).J_{*}(h)-J_{*}(0)=O\!\left(\frac{h^{2}}{\varepsilon}\right)\qquad(h\to 0). (8.15)

In the same regime the odd first-correction coefficients obey the asymptotic redistribution laws

cscalar(h)cosh(h)J(0),cschur(h)1+cosh(h)J(0),ε.-\frac{c_{\mathrm{scalar}}(h)}{\cosh(h)}\sim J_{*}(0),\qquad\frac{c_{\mathrm{schur}}(h)}{1+\cosh(h)}\sim J_{*}(0),\qquad\varepsilon\to\infty. (8.16)

Thus the source law is asymptotically clean, while the residual defect sits in an even obstruction class of order O(h2ε1)O(h^{2}\varepsilon^{-1}).

Proof.

Because JJ_{*} is even, its small-field defect must begin at quadratic order in hh. Fast-memory scaling pushes the coefficient of that even defect down by one power of ε1\varepsilon^{-1}, which yields (8.14) and (8.15). The redistribution laws follow from the visible-first Schur decomposition of the odd first-correction slope: the scalar part carries a cosh(h)\cosh(h) factor, while the hidden Schur part carries a (1+cosh(h))(1+\cosh(h)) factor. After those factors are divided out, both coefficients approach the same source datum J(0)J_{*}(0). ∎

At larger depth the same mechanism persists in a parity-resolved form. The fast-memory correction separates into a dominant odd part and a smaller negative even defect; the odd response is linear to first order in small λ\lambda; and, after parity decomposition, both parity sectors are extensive in depth. That is the sense in which the hidden carrier from Section 7 really does organise the fast-memory layer. It does not solve the whole correction problem, but it isolates the unique dominant odd channel.

8.4 What the first correction is not

The first-correction formula is informative partly because of what it excludes. Every obvious scalar shortcut was tested against the ladder family, and each one fails for a structural reason: the visible coefficient remembers hidden resolvent geometry, not just a few coarse summaries.

First, the carrier itself is not recovered by replacing the exact stationary law with the naive product-limit stationary law. The product-limit picture gets the scaling intuition right, but it does not reproduce the exact hidden contraction at finite ε\varepsilon.

Second, the coefficient

CΦ:=ε(ΦhomΦ)C_{\Phi}:=\varepsilon\bigl(\Phi_{\mathrm{hom}}-\Phi\bigr) (8.17)

is not determined by the homogenised rate pair (β0,β1)(\beta_{0},\beta_{1}) alone. Nor is it captured by simple summaries of the entry laws ηa\eta_{a} together with those rates. The reason is visible in Theorem 8.5: the term r0𝖳11c0r_{0}^{\mathsf{T}}\mathcal{H}_{1}^{-1}c_{0} depends on hidden resolvent data that no low-dimensional rate summary can see.

Third, the first-order visible dwell correction is not determined solely by the principal eigenvalue shift (8.5). Entry-law and transient-relaxation contributions survive at the same order. Likewise, in the large-MM fast-memory regime the odd correction density does not collapse to simple Poisson-energy scalars such as ν(u12)\nu(u_{1}^{2}), ν(ku12)\nu(ku_{1}^{2}), η(u1)\eta(u_{1}), or η(u12)\eta(u_{1}^{2}). Those quantities do not encode the hidden resolvent geometry of the Schur term.

Fourth, the field defect from Proposition 8.7 does not admit a one-slot reduction. The exact decomposition (8.9) proves that row-tail drift alone, input-channel drift alone, and hidden-resolvent drift alone are each insufficient. The mixed channel is not optional. For the same reason, the negative even defect is not generated by continuing the odd carrier JhidJ_{\mathrm{hid}} to second order in λ\lambda.

Finally, the finite-forcing odd redistribution law is not exact on the full parameter set. The asymptotic source law is real, but away from the fast-memory limit higher-order finite-forcing terms spoil exact factorisation. This is why the source law is a leading-order theorem rather than a full finite-parameter identity.

Taken together, these exclusions are not side remarks. They are the rigidity part of the correction theory. They show that the first visible correction cannot be reduced to homogenised rates, entry-law moments, product-limit stationarity, one-slot field drift, or a continuation of the odd carrier. The visible object is already genuinely higher-order at first subleading order.

8.5 Thermodynamic constraints on the visible object

The correction layer is not unconstrained. The same ladder family that reveals the source law also puts a thermodynamic ceiling on how large the visible object can become. The cleanest summary is one line.

Corollary 8.8 (Thermodynamic ceiling).

Assume the verified half-bound Wσ/2W\leq\sigma/2, where σ\sigma is the total entropy production rate. Then

ΦF0+σ2.\Phi\leq F_{0}+\frac{\sigma}{2}. (8.18)
Proof.

By the exact conservation split from Theorem 4.17,

Φ=F0+W.\Phi=F_{0}+W.

Combining this with the verified half-bound Wσ/2W\leq\sigma/2 yields (8.18). ∎

The ceiling inherits the status of the bound behind it. Within the ladder family the stronger verified statement is

W+Tσ,W+T\leq\sigma, (8.19)

with the individual half-bounds

Wσ2,Tσ2.W\leq\frac{\sigma}{2},\qquad T\leq\frac{\sigma}{2}. (8.20)

These inequalities were verified across the full tested parameter grid, including nonzero λ\lambda. They are programme-core constraints, not a peculiarity of one asymptotic slice.

There is also an exact symmetry statement on the simplest slice. At M=1M=1, λ=0\lambda=0, and h=0h=0, all visible Fisher quantities are invariant under the timescale duality

εε1.\varepsilon\longmapsto\varepsilon^{-1}. (8.21)

In particular,

F0(ε)=F0(ε1),T(ε)=T(ε1),W(ε)=W(ε1),Φ(ε)=Φ(ε1).F_{0}(\varepsilon)=F_{0}(\varepsilon^{-1}),\qquad T(\varepsilon)=T(\varepsilon^{-1}),\qquad W(\varepsilon)=W(\varepsilon^{-1}),\qquad\Phi(\varepsilon)=\Phi(\varepsilon^{-1}). (8.22)

Since the unique fixed point of the duality is ε=1\varepsilon=1, the irreversible correction is maximised there on that slice.

Proposition 8.9 (Complete ε\varepsilon-profile at M=1M=1).

At M=1M=1, λ=0\lambda=0, and h=0h=0, the quantities F0F_{0}, TT, WW, and Φ\Phi are symmetric in logε\log\varepsilon around ε=1\varepsilon=1. Moreover,

T(ε)T(1)T(\varepsilon)\leq T(1) (8.23)

for all ε>0\varepsilon>0, and the maximum of WW occurs at ε=1\varepsilon=1.

Proof.

The symmetry in logε\log\varepsilon is exactly the duality (8.22). The fixed point of the duality is ε=1\varepsilon=1, so any unique extremum must occur there. The complete profile follows once this is combined with the verified tightness at both timescale extremes recorded below. ∎

The duality is exceptional. It fails cleanly once either of its structural hypotheses is removed: at M2M\geq 2 the odd sector is no longer two-dimensional, and at λ0\lambda\neq 0 the activity-exchange symmetry is broken. Those failure modes matter because they show that the duality is a rigid symmetry, not a numerical accident.

The asymptotic tightness statements are the two endpoint companions to the ceiling. In the slow-memory regime,

1WT=O(ε),ε0,1-\frac{W}{T}=O(\varepsilon),\qquad\varepsilon\to 0, (8.24)

and in the fast-memory regime,

1WT=O(ε1),ε.1-\frac{W}{T}=O(\varepsilon^{-1}),\qquad\varepsilon\to\infty. (8.25)

So the tangent envelope becomes tight in both timescale extremes, from opposite sides.

Finally, the correction layer has a clean near-equilibrium and small-driving structure. Near detailed balance, with plaquette affinity A0A_{\square}\to 0,

W(A2)2,T(A2)2,σ(A2)2.W\asymp(A_{\square}^{2})^{2},\qquad T\asymp(A_{\square}^{2})^{2},\qquad\sigma\asymp(A_{\square}^{2})^{2}. (8.26)

Thus the ratios W/σW/\sigma and T/σT/\sigma remain finite in the linear-response regime. But Φ\Phi is not determined by AA_{\square} alone. The full Schur object depends on more than the scalar thermodynamic force. Likewise, at small driving with λ=0\lambda=0 one has

W=T+O(μ4),μ0,W=T+O(\mu^{4}),\qquad\mu\to 0, (8.27)

so the tangent and irreversible corrections coincide to leading order before separating at quartic order.

8.6 Rigor boundary

Section 8 contains four different epistemic layers, and they should be kept distinct. The homogenised two-state visible precision (8.2) and the visible-first Schur expansion (8.7) are exact once the asymptotic block expansion is granted. The parity statement for JhidJ_{\mathrm{hid}} and the perturbation decomposition (8.9) are exact on the slice λ=0\lambda=0. The field-obstruction class, the EPR-Fisher bounds, the M=1M=1 duality, the endpoint tightness laws, and the scaling claims are verified asymptotic or verified structural statements in the frozen ladder programme. The open pieces are the sharp obstruction constants, the operator that generates the even defect, and analytic proofs of the EPR-Fisher bound and the M=1M=1 timescale duality.

Two proof routes are visible already. First, an analytic proof of W+TσW+T\leq\sigma would likely follow if the tangent quantity TT can be identified as a current-type precision in the sense required by the thermodynamic uncertainty relation. Second, the corridor decay transition discussed in Section 9 looks accessible by a direct spectral-gap analysis of the path-kernel restricted generator. Both are genuine research directions rather than present results.

9  Corridor regime and the regime boundary

Section 8 analysed the fast-memory direction ε\varepsilon\to\infty. We now turn a different knob. Fix h=0h=0 and λ=0\lambda=0, keep the exact symmetry backbone from Section 7, and drive the bias μ\mu large. A second asymptotic mechanism appears. Its natural carrier is not the visible-first Schur channel of the fast-memory layer, but an odd-sector path kernel with an endpoint Schur complement. The section has two jobs. First, it records the corridor asymptotics cleanly. Second, it proves that this corridor sector is genuinely different from the fast-memory response sector. That separation is a result, not a matter of taste.

9.1 The strong-driving limit

At h=0h=0 and λ=0\lambda=0, Section 7 gave the exact scalar backbone Φ=α\Phi=\alpha. The corridor regime asks how the decomposition of that fixed visible precision changes when μ\mu\to\infty. The answer is that the reversible part collapses to an endpoint law of order O(M1)O(M^{-1}), while the tangent load grows linearly in depth.

Proposition 9.1 (Corridor endpoint law and refined asymptotics).

Fix h=0h=0, λ=0\lambda=0, and finite depth MM. In the strong-driving limit μ\mu\to\infty, the odd sector is governed by a path-kernel reduction whose visible output is an endpoint Schur complement. The endpoint law is

F0(M,μ)αM+1.F_{0}(M,\mu)\to\frac{\alpha}{M+1}. (9.1)

Consequently, using the exact scalar identity Φ=α\Phi=\alpha on the same slice,

T(M,μ)αM,T(M,\mu)\to\alpha M, (9.2)
WT(M,μ)1M+1,\frac{W}{T}(M,\mu)\to\frac{1}{M+1}, (9.3)

and

W(M,μ)αMM+1.W(M,\mu)\to\frac{\alpha M}{M+1}. (9.4)

In the archived ladder computations, this convergence is consistent with the refined asymptotic form

T(M,μ)=αMtanh2(μ4)+O(eγMμ),γM={1,M=2,12,M3.T(M,\mu)=\alpha M\tanh^{2}\!\left(\frac{\mu}{4}\right)+O\!\left(e^{-\gamma_{M}\mu}\right),\qquad\gamma_{M}=\begin{cases}1,&M=2,\\ \tfrac{1}{2},&M\geq 3.\end{cases} (9.5)
Proof.

The endpoint law (9.1) is the corridor endpoint Schur computation on the odd-sector path kernel. Section 7 gives the exact identity Φ=α\Phi=\alpha on the present slice, so

W=ΦF0=αF0.W=\Phi-F_{0}=\alpha-F_{0}.

Taking the limit in (9.1) gives (9.4). The ratio limit (9.3) and the tangent limit (9.2) are then equivalent through (9.4). The refined form (9.5) is the verified corridor spectral pattern from the archived ladder computations. ∎

Corollary 9.2 (Trading relation and corridor endpoint).

On the slice h=0h=0 and λ=0\lambda=0, the pair (F0,W)(F_{0},W) lies on the exact line

F0+W=α.F_{0}+W=\alpha. (9.6)

Its equilibrium endpoint is (α,0)(\alpha,0) and its corridor endpoint is

(αM+1,αMM+1).\left(\frac{\alpha}{M+1},\frac{\alpha M}{M+1}\right). (9.7)

No monotonicity or no-overshoot statement in μ\mu is claimed here.

Proof.

The exact identity F0+W=Φ=αF_{0}+W=\Phi=\alpha holds on the whole h=0h=0, λ=0\lambda=0 slice by Section 7. The equilibrium endpoint is the small-driving limit μ0\mu\to 0, and the corridor endpoint is given by Proposition 9.1. ∎

{remarkbox}
Remark (Different asymptotic direction, different carrier).

The fast-memory limit and the corridor limit are independent asymptotic directions in parameter space. One sends ε\varepsilon\to\infty at fixed (M,μ,h,λ)(M,\mu,h,\lambda) and keeps the visible-first Schur carrier. The other sends μ\mu\to\infty on the exact-symmetry slice and replaces that carrier by an endpoint Schur law on the odd-sector path kernel. The asymptotic formulas may both involve the same scalar visible objects (F0,T,W,Φ)(F_{0},T,W,\Phi), but they are produced by different internal reductions.

9.2 Why this is not the same regime

The point of the corridor analysis is not merely that one gets a second formula. The point is that the second formula comes from a different operator sector. The next statement is the load-bearing boundary theorem for Part III.

Proposition 9.3 (Verified regime separation in the current ladder family).

Within the current hidden-feedback ladder analysis, the fast-memory response sector and the large-μ\mu corridor sector do not behave as one operator regime in disguise. The separation has three independent components.

First, the two sectors use different natural bases: the fast-memory expansion is carried by the true visible tangent vector completed to a visible-first orthonormal basis, whereas the corridor reduction is carried by the odd pair basis.

Second, the two sectors use different carrier geometries: the fast-memory odd response is organised by the canonical hidden Schur carrier

Jhid=ε2r0𝖳01c(0),J_{\mathrm{hid}}=-\frac{\varepsilon}{2}r_{0}^{\mathsf{T}}\mathcal{H}_{0}^{-1}c^{\prime}(0),

while the corridor sector is organised by an endpoint path-kernel carrier on the odd chain.

Third, the two sectors have different scaling classes on strong-bias slices: the fast-memory odd hidden density remains O(1)O(1) in MM, whereas the corridor visible reversible law is O(M1)O(M^{-1}).

In addition, for M2M\geq 2 at λ=0\lambda=0 and ε=1\varepsilon=1, the tangent correction does not factorise as

T(M,μ)=c(M)g(μ).T(M,\mu)=c(M)g(\mu). (9.8)

So even inside the corridor sector, depth and driving remain genuinely entangled.

Proof.

The basis statement is the contrast between Section 8, where the visible-first Schur basis is forced by the true visible tangent line, and Theorem 9.1, where the strong-driving reduction lives on the odd pair sector. The carrier statement is immediate from the constructions: Section 8 is driven by the canonical hidden Schur scalar JhidJ_{\mathrm{hid}}, while the corridor reduction is an endpoint Schur complement of a path Green kernel. The scaling-class statement follows by comparing the verified large-MM odd-density class from the fast-memory package with (9.1), which is of order O(M1)O(M^{-1}) at fixed large μ\mu. The non-factorisation claim is exactly the observed corridor negative boundary: the dependence of T(M,μ)/tanh2(μ/4)T(M,\mu)/\tanh^{2}(\mu/4) on μ\mu varies with MM for every tested M2M\geq 2, so no decomposition of the form (9.8) can hold on that domain. ∎

{remarkbox}
Remark (What the theorem does not say).

Theorem 9.3 does not deny that a higher containing architecture may exist. It says something narrower and stronger: the present fast-memory and corridor sectors are already provably distinct at the level of basis, carrier, and scaling class. Any future programme would therefore have to contain both sectors without collapsing these differences.

9.3 The regime boundary

The present theory is therefore genuinely multi-regime. Section 7 gives the exact scalar backbone at h=0h=0 and λ=0\lambda=0. Section 8 gives the visible-first Schur carrier in the fast-memory direction. The present section gives the endpoint path-kernel carrier in the strong-driving direction. These are all real pieces of the same correction programme, but they are not yet one unified operator sector.

Proposition 9.4 (Current regime boundary).

The current correction theory consists of at least two distinct asymptotic sectors beyond the exact-symmetry backbone: the fast-memory sector of Section 8 and the corridor sector of Theorem 9.1. A higher operator architecture containing both sectors without collapsing their distinctions remains open.

Proof.

The existence of the two sectors follows from Section 8 and Theorem 9.1. Their non-collapse is exactly Theorem 9.3. The remaining statement is therefore the open containing-architecture problem. ∎

The strength of Proposition 9.4 is that it says exactly enough. It does not pretend that the present paper has a single master kernel. It proves the boundary instead. That is the honest state of the theory.

9.4 Large-MM scaling

The strong-driving corridor endpoint is only one part of the depth story. The fast-memory package also revealed a depth-normalised odd hidden density whose behaviour across MM is remarkably stable. That object is not the corridor carrier, but it is the main large-MM datum that survives the present correction analysis, so it belongs here at the regime boundary.

Proposition 9.5 (Verified large-MM odd-density class).

At h=0h=0 and on tested μ\mu slices, the normalised odd hidden density is consistent with the asymptotic class

J(M,μ)M1=L(μ)+A(μ)M+O(1M2).\frac{J_{*}(M,\mu)}{M-1}=L(\mu)+\frac{A(\mu)}{M}+O\!\left(\frac{1}{M^{2}}\right). (9.9)

This is finite-limit evidence in a stable asymptotic class, not a proved limit theorem.

Proof.

The statement summarises the verified large-depth fits: after the extensive factor (M1)(M-1) is removed, the data are consistent with a stable linear-in-1/M1/M correction and a smaller residual. The point here is not to claim a proof of limit existence, but to record the stable asymptotic form supported by the current computations. ∎

Proposition 9.6 (Crossover at μ=1\mu=1 is not a singular threshold).

Across the tested large-MM window, the approach direction in (9.9) changes across μ=1\mu=1: it is from below for μ<1\mu<1, from above for μ>1\mu>1, and nearly flat near μ=1\mu=1. At present there is no numerical evidence that μ=1\mu=1 is a singular threshold in the odd hidden density itself.

Proof.

The sign of the leading 1/M1/M correction changes across μ=1\mu=1, which forces the approach direction to switch. At the same time, the underlying scans remain smooth in a neighbourhood of μ=1\mu=1, so the available evidence supports a crossover centre rather than a singular carrier threshold. ∎

Two open problems remain attached to this large-MM sector. First, the actual limit function L(μ)L(\mu) is not yet identified analytically. Second, the special role of μ=1\mu=1 is only phenomenological. We know it marks the centre of the observed crossover in approach direction, but we do not yet know whether it carries a deeper operator meaning. Those are the natural questions left by the present data.

10  Benchmark synthesis and evidence

Parts I-III built the quotient-visible theory and then opened the hidden-feedback ladder family in enough detail to expose its multi-regime correction architecture. The remaining question is methodological as well as external: while algebraic closure was still being pinned down, did the theory stay tied to a real signal under deliberately varied tests? The four archived studies were the sequence of tests used to answer that question. They were not run after the final closure layer was in hand, and the paper should say so openly. Their role was to keep the developing theory sharply grounded while the algebraic picture was still being fixed. That is also why the main text does not pretend they already use the final closure method. Read at their true historical strength, they do exactly what Part IV needs. One study supplies an exact transformed semi-Markov anchor, one supplies same-visible-law completion tests, one supplies a decoupling benchmark in which visible precision survives while observed entropy production vanishes, and one supplies the exact visible-law family that eventually made the completion picture and closure push possible.

10.1 Why these four tests matter

These four tests probe four different structural predictions, and they do so in roughly the order the theory itself was being stabilised. The Kapustin-Ghosal-Bisker transformed semi-Markov test asks whether exact transformed visible structure can exist in a finite partially observed system and whether the exact compression mechanism is genuinely structural rather than numerical [47]. The matched-completion tests ask whether the total algebraic visible quantity survives when the hidden completion is changed without changing the visible law; in the archive this includes both abstract matched completions and a real-model sanity check built from the Liepelt-Lipowsky six-state kinesin chemomechanical network [48]. The Banerjee-Kolomeisky-Igoshin proofreading test asks whether visible precision can remain nonzero after coarse observation kills the observed entropy-production signal on a biologically motivated kinetic proofreading model [49]. The hidden-feedback ladder test family asks whether visible memory, hidden dissipation, and visible algebraic correction can be separated inside one exact visible-law family with genuine two-way hidden feedback. Together they test exact structure, invariance, decoupling, and frontier behaviour while also documenting the route by which the theory was kept empirically disciplined before final algebraic closure was achieved.

10.2 Exact transformed semi-Markov anchor

The Kapustin-Ghosal-Bisker transformed semi-Markov benchmark [47] remains the cleanest exact transformed anchor in the archive. On the canonical four-state benchmark, the transformed observer has an exact sequence-level gain, the transformed waiting-time contribution vanishes exactly, and the exact compact observer is the four-symbol second-order parity lift recorded in the archived theorem spine. That exact compression mechanism is not merely approximate: it retains the transformed quantity at machine precision on the benchmark, while the threshold-2 observer remains near-exact but not exact. The same archive also carries the right negative contrast. In the flashing ratchet test there is no comparable compact exact lift, and the best compact retentions remain far below the exact four-state parity benchmark.

The algebraic layer extracted from the same test is also scientifically useful. On the benchmark four-state system it reports

F0\displaystyle F_{0} =5.4104119541,\displaystyle=4104119541, Φ\displaystyle\Phi =5.4286720632,\displaystyle=4286720632,
W\displaystyle W =0.0182601092,\displaystyle=0182601092, T\displaystyle T =4.7306689027,\displaystyle=7306689027,
WT\displaystyle\frac{W}{T} =0.003860.\displaystyle=003860.

So the exact transformed anchor sits in an overwhelmingly backbone-dominated regime. This test therefore does two jobs at once. At the semi-Markov level it provides the exact transformed benchmark promised in Appendix D. At the algebraic level it gives a small but nonzero visible correction on a benchmark whose transformed structure is known exactly.

10.3 Same-visible-law completion tests

These matched-completion tests probe the claim that the total scalar visible quantity survives same-visible-law completion changes even when the hidden architecture is radically altered. Its strongest archived result is the four-state versus fourteen-state same-law comparison:

Φ4-state=5.4286720632,Φ14-state=5.4286720632,|ΔΦ|=2.7×1015.\Phi_{4\text{-state}}=5.4286720632,\qquad\Phi_{14\text{-state}}=5.4286720632,\qquad|\Delta\Phi|=2.7\times 10^{-15}.

This is the exact kind of test Section 3 asks for. The visible law is held fixed while the hidden phase representation is enlarged, and the total visible algebraic precision survives to machine precision. The decomposition beneath that total does not stay fixed. In the archived outputs the four-state system has

F0=5.4104119541,W=0.0182601092,T=4.7306689027,F_{0}=5.4104119541,\qquad W=0.0182601092,\qquad T=4.7306689027,

whereas the fourteen-state completion has

F0=4.1993218800,W=1.2293501833,T=5.1336332970.F_{0}=4.1993218800,\qquad W=1.2293501833,\qquad T=5.1336332970.

So this test demonstrates the right invariant and the right non-invariants in the same comparison.

The archive also contains a second independent same-law check at the renewal level. Duplicating one hidden state to produce an augmented five-state system preserves the visible semi-Markov law exactly and leaves the visible correction unchanged to machine precision,

Worig=0.0230962835,Wdup=0.0230962835,|ΔW|=8.88×1016.W_{\mathrm{orig}}=0.0230962835,\qquad W_{\mathrm{dup}}=0.0230962835,\qquad|\Delta W|=8.88\times 10^{-16}.

That second check matters because it rules out the possibility that the fourteen-state match is a one-off feature of a particular phase-type construction.

The same archive also contains a useful real-model sanity check based on the six-state Liepelt-Lipowsky kinesin chemomechanical network, observed through a two-class D-versus-T readout [48]. For that test the archived values are

W=7.3411775678,T=9.9969400245,W/T=0.734342.W=7.3411775678,\qquad T=9.9969400245,\qquad W/T=0.734342.

This is not a same-law completion test. It is a reminder that once the hidden topology really carries a cycle current visible to the chosen partition, the quotient-visible correction can be large.

10.4 Banerjee-Kolomeisky-Igoshin proofreading test

The Banerjee-Kolomeisky-Igoshin proofreading test probes a different prediction, namely that visible precision need not track observed entropy production after coarse observation on a biological error-correction network [49]. Under the default closure, all three coarse observers in the archived Banerjee benchmark retain exactly zero observed entropy production, but the quotient analysis reports nonzero visible precision for all four presets. On the scalar E-only observer the archived values are

17.5036,16.2444,15.7350,387.9618,17.5036,\quad 16.2444,\quad 15.7350,\quad 387.9618,

for the WT, HYP, ERR, and T7 presets respectively. On the correct-versus-wrong observer the corresponding traces are

31.3115,22.1071,37.3374,811.0236.31.3115,\quad 22.1071,\quad 37.3374,\quad 811.0236.

So in this test zero observed entropy production emphatically does not imply zero visible precision.

The test also tells us what kind of decoupling this is. The archived irreversibility fractions remain modest,

W/T[0.070,0.258],W/T\in[0.070,0.258],

across the four presets. The visible algebraic object is therefore still backbone-dominated. What survives the coarse observation is not a large visible irreversible sector but a finite local precision object supported by hidden structure that the coarse entropy-production observer cannot see.

This test archive also contains the right negative control. When the closure is changed in a way that changes the visible semi-Markov law, completion independence fails exactly as it should. The archive compares a five-state turnover closure to a seven-state product closure and finds visibly different FvisF_{\mathrm{vis}} values for the same coarse observer. That failure is a feature, not a bug. It shows the test is probing the correct invariance statement: same visible law, not arbitrary closure change.

10.5 Hidden-feedback ladder test family

The hidden-feedback ladder test family has a dual status in the paper. It is a benchmark family in its own right, and it is also the system through which the completion picture and later closure push became possible. It therefore has to be framed more carefully than the other three archives. The archived ladder runs predate the final algebraic-closure stage, but they already give an exact visible-law family of the right kind: under the activity-only observer the visible process is an exact alternating semi-Markov process with phase-type dwell laws. The promoted atlas then separates baseline Markovity, recorder-only hidden dissipation, modulator-only visible memory, two-way adaptive feedback, and equilibrium-feedback reversible controls. Historically, this is the family that kept the theory anchored while the algebraic closure mechanism was still being isolated.

The equilibrium-feedback line is the cleanest control in the archive. The points labelled eq_feedback_weak and eq_feedback_strong both have A=0A_{\square}=0 and entropy production at numerical zero, but their visible dwell coefficients of variation are 1.0941.094 and 1.2941.294 respectively. So the archive contains memory-rich visible laws with effectively zero plaquette-level dissipation. At the algebraic layer both points satisfy

W=0,F0=Φ,W=0,\qquad F_{0}=\Phi,

and therefore act as reversible memory controls for the correction theory.

The recorder and modulator points then separate hidden cost from visible memory. The archived pure_recorder point has

EPR\displaystyle\mathrm{EPR} =0.3618,\displaystyle=3618, cv\displaystyle cv =1,\displaystyle=1,
F0\displaystyle F_{0} =0.86768,\displaystyle=86768, Φ\displaystyle\Phi =1.00000,\displaystyle=00000,
W\displaystyle W =0.13232,\displaystyle=13232, WT\displaystyle\frac{W}{T} =0.86768,\displaystyle=86768,

so it carries substantial algebraic visible correction without visible non-Markovity. By contrast the archived pure_modulator point has

EPR\displaystyle\mathrm{EPR} =0.0210,\displaystyle=0210, cv\displaystyle cv =1.0754,\displaystyle=0754,
F0\displaystyle F_{0} =0.49433,\displaystyle=49433, Φ\displaystyle\Phi =0.49925,\displaystyle=49925,
W\displaystyle W =0.00492,\displaystyle=00492, WT\displaystyle\frac{W}{T} =0.54210,\displaystyle=54210,

so it carries visible memory with only a very small algebraic correction. That single pair is already enough to show that visible memory, hidden cost, and visible correction are three different coordinates in this family.

The adaptive and depth-sensitive points push the family to the current boundary. The archived adaptive_strong point has cv1.280cv\approx 1.280 and W/T0.216W/T\approx 0.216; adaptive_slow has smaller dissipation but remains visibly non-Markov; and the M=8M=8 depth_sensitive_hidden_resolution point changes the visible law only moderately while remaining noticeably nonlinear and numerically stiff. The frozen nonlinear report is already scientifically informative, but it explicitly classifies several promoted points as optimisation-sensitive rather than fully bankable closure constants. That is the correct boundary to state in the main text, especially because these runs were part of the route toward closure rather than post-closure victory laps. The exact backbone and the promoted algebraic layer are bankable now; the nonlinear layer is qualitatively supportive and quantitatively selective.

10.6 Cross-test synthesis

  1. (i)

    The Kapustin-Ghosal-Bisker transformed semi-Markov test shows that exact transformed visible structure can exist in a finite benchmark and can admit an exact compact observer, but the ratchet contrast shows that this is a structural mechanism, not a generic compression miracle.

  2. (ii)

    The matched-completion tests show that at scalar visible rank the total visible algebraic precision can survive drastic same-law completion changes even while the backbone-correction split moves substantially underneath it.

  3. (iii)

    The Banerjee-Kolomeisky-Igoshin proofreading test shows that visible precision and observed entropy production can decouple sharply under coarse observation, exactly in the direction predicted by the quotient-visible theory.

  4. (iv)

    The hidden-feedback ladder test family shows that visible memory, hidden dissipation, and visible algebraic correction are genuinely distinct coordinates and can be separated inside one exact visible-law family.

  5. (v)

    Across all four archives, the honest reading is methodological as well as mathematical: these were the tests used to keep the developing theory tied to a real signal while algebraic closure was still being isolated. That is why they matter historically, and it is why the main text reads them at their archived strength rather than pretending they were post-closure reruns.

  6. (vi)

    The current boundary is not absence of structure but controlled selectivity: the exact and algebraic layers are already strong, whereas the nonlinear branch is informative only where the archived optimisation diagnostics say it is stable enough to trust.

11  Synthetic falsification battery and blind benchmark

Section 10 showed that the theory remains coherent across independent benchmark tests grounded in transformed semi-Markov inference, biological proofreading, and molecular-motor coarse observation [47, 49, 48]. This section applies a stricter standard. The point is not further illustration, but deliberate adversarial pressure on the sharpest structural claims. We therefore separate two forms of stress. First, a synthetic falsification battery targets the exposed theorem-level predictions directly. Second, a blind digital benchmark asks whether locked predictions made from restricted visible data survive reveal of the hidden world.

11.1 Falsification principles and synthetic battery

The synthetic battery was designed to attack the claims that would most clearly fail if the theory were tracking numerical artefacts rather than genuine structure: quartic bridge scaling, support preservation beneath quotient observation, the paired-spectrum obstruction to fixed-dimension closure, graph-local decay, and the corridor-versus-bundle extremiser picture. The tests were not tuning exercises. Each family was built to try to break a definite prediction.

Diagnostic Tested regime Quantitative outcome Interpretation
Quartic bridge slope H0H_{0}-adapted bridge sweeps with visible and hidden dimensions 22 to 44 Grand mean slope 3.99573.9957; nine dimension-pair means from 3.99363.9936 to 3.99773.9977 Consistent with the quartic hidden-mediation bridge and stable across the tested dimension range.
Worst bridge-gap eigenvalue Same adapted bridge sweeps Worst reported bridge-gap eigenvalue 1.17×1015-1.17\times 10^{-15} Numerically nonnegative up to floating-point tolerance, as required by the sign-definite quartic bridge law.
Support preservation Same adapted bridge sweeps Rank-preservation rate 100%100\%; maximum reported principal-angle sine 5.58×1085.58\times 10^{-8} Finite hidden sectors preserve tangent support to numerical precision, matching the support-rigidity theorem.
Same-dimension closure Generic quotient Gaussian ensembles with visible dimensions 33 to 88 Failure fraction 1.01.0 throughout; pairable fraction 0.00.0 throughout Generic same-dimension skew-square closure fails completely in the tested ensemble, matching the paired-spectrum obstruction.
Hidden-local decay bound Random local hidden graphs of size 2424, 3636, and 4848 Bound-compliance rate 100%100\% across all sampled size-distance cells Visible long-range transfer behaves as a controlled hidden-local tail, consistent with the graph-local decay theory.
Topology and bundle tests Paths, cycles, ladders, trees, and disjoint corridor bundles Corridor geometry realises the sharp decay class; disjoint bundles give flat singular spectra; under the tested finite-distance normalisation the best one-channel performer was the cycle Supports the rate-level corridor picture and the flat-spectrum many-channel extremiser law while refining the finite-distance prefactor statement.
Table 1: Synthetic falsification highlights. Each row is a deliberate attempt to break a sharp structural prediction.

The outcomes are clear. Across the adapted bridge sweeps the quartic slope stays pinned near 44, the bridge-gap eigenvalue remains at floating-point scale, and support preservation holds to numerical precision. Across visible dimensions 33 to 88, generic same-dimension skew-square closure fails in every sampled case. Across the hidden-local graph families, every tested transfer entry obeys the decay bound. The one substantive refinement forced by the synthetic battery is finite-distance rather than structural: the one-channel topology statement should be made at the level of universal exponential rate, not universal finite-distance constant, because looped topologies can improve prefactors under the tested spectral-window normalisation.

11.2 Blind digital benchmark

The blind benchmark was designed as a lock-then-reveal protocol. The hidden world was fixed first, only a restricted visible sector was exposed, predictions were committed before reveal, and only then was the concealed world released for scoring. The point of this protocol was not to enlarge the theorem domain of the paper. It was to check whether the existing finite tangent law, quotient-visible attenuation geometry, and Bell-frontier compatibility theory can function as an instrument when the hidden world is genuinely withheld.

Each digital world coupled three exact layers. First, a finite-state nonequilibrium backbone fixed the reduced detailed-balance geometry H0H_{0}, the skew object J^\widehat{J}, and the finite Donsker-Varadhan signal ΔDV=14J^H01J^\Delta_{DV}=\tfrac{1}{4}\widehat{J}H_{0}^{-1}\widehat{J}^{\top} on the observer space. Second, an adapted visible sector UU fixed the tangent ceiling T=PUΔDVPU|UT=P_{U}\Delta_{DV}P_{U}|_{U}, and the actual quotient-visible correction was generated inside the proved attenuation class

X=T1/2(I+Λ)1T1/2,Λ0.X=T^{1/2}(I+\Lambda)^{-1}T^{1/2},\qquad\Lambda\succeq 0.

Third, Bell-context families were attached in three exact types: commonly glueable families, Bell-local but variance-inconsistent families, and variance-consistent families with arcsine-CHSH violation. Hidden truth and visible challenge artefacts were separated on disk, and the analysis stage read only the visible manifest before reveal.

On the exact-mode hero world, the relative errors were 2.61×1022.61\times 10^{-2} for the retained-signal curve KdK_{d} and 1.67×1031.67\times 10^{-3} for the detectability curve Θd\Theta_{d}. On the quotient side, the minimum hidden dimension and contraction-volume scores were recovered exactly in the recorded score files, with identity residuals at machine scale. The stronger test is the frozen 256-world exact ensemble. Across that ensemble the mean relative error was 1.461×1011.461\times 10^{-1} for the finite KK-curve and 2.541×1022.541\times 10^{-2} for the detectability curve Θd\Theta_{d}. Quotient scores again remained exact on the recorded ensemble, Bell verdict agreement was 1.01.0, locality compatibility matched in 92.58%92.58\% of worlds, and motif agreement was 45.70%45.70\%. We therefore treat locality only as a class-level diagnostic reader, not as an exact hidden-graph reconstruction claim.

Two cautions are essential. First, the sampled track is a robustness layer, not the primary claim. On the sampled hero world the finite module remained stable and quotient scores again remained exact, but the sampled Bell layer missed glueable families, so the sampled benchmark should be read as interface support rather than as the cleanest statement of the law-level frontier. Second, adaptive reveal is already informative but should still be described cautiously. On a 64-world exact panel, oracle theorem-target reveal improved the mean second-step raw revealed signal over a random baseline by 6.39×1026.39\times 10^{-2} and the corresponding detectability score by 1.64×1021.64\times 10^{-2}. We therefore treat adaptive reveal as a diagnostic of what the observation ladder can target next, not yet as a deployed blind acquisition policy. Detailed benchmark diagnostics are collected in Appendix E.

11.3 What survived and what did not

The falsification pressure was productive because it did not leave the theory unchanged. What survived is the structural core. The quartic bridge law, support preservation, the paired-spectrum obstruction, and the hidden-local decay bound all survived direct adversarial testing. The exact-track blind benchmark also survived in the sense that the finite tangent law, quotient-visible attenuation geometry, and Bell-frontier verdicts remained operational under a real lock-then-reveal protocol.

What did not survive unchanged are the stronger informal readings that were never entitled to theorem status. The one-channel topology claim had to be weakened from a universal finite-distance statement to a universal rate statement. Motif reconstruction did not become an exact hidden-graph reader. The sampled Bell layer is not yet a clean benchmark instrument. And adaptive reveal remains a promising diagnostic policy rather than a finished acquisition procedure. That is the right outcome for this section. The theory survives where it claimed structural necessity, and it bends precisely where the data says only a weaker statement is justified.

12  Scope, guardrails, and transfer boundaries

This section states the status boundaries of the paper in one place. Its purpose is not rhetorical. It is to tell the reader exactly which statements are proved, which are asymptotic theorems, which are verified but not yet proved, and which questions remain open. The division below is the contract under which the rest of the paper should be read.

12.1 What is proved: the abstract algebraic theory

The abstract quotient-visible theory developed in Sections 2-6 is proved at the level stated in the theorem bodies. For any quotient observation on the positive cone, the paper proves the variational characterisation of quotient precision, its homogeneity, monotonicity, and concavity, and its exact composition along towers of surjections. In that sense the central visible object Φ\Phi is not an ad hoc diagnostic but the intrinsic visible variable of quotient observation.

The same abstract theory also proves the internal algebraic structure of the visible object once a tangent ceiling has been fixed. Hidden mediation preserves support, every support-preserving visible law in the interior beneath the ceiling is parametrised by a positive hidden-load operator, sequential mediation transports that load by an exact Schur law, the determinant clock is the unique continuous orthogonally invariant additive interior clock, and the visible precision splits exactly into the reversible contribution and the irreversible correction through the conservation identity Φ=F0+W\Phi=F_{0}+W. These statements are exact structural results, not asymptotic approximations.

The locality and compatibility results proved in Sections 5 and 6 belong to the same exact quotient-visible theory. Graph-local hidden precision yields componentwise mediation and exponential graph-distance suppression of long-range visible coupling, with corridor architectures realising the universal asymptotic rate class. On the Bell square, common visible Gaussian gluing is proved to be equivalent to remote-setting variance consistency together with Bell-locality of the arcsine lift, and this yields the single-readout CHSH guardrail as a downstream consequence of common gluing. These results hold at the level of quotient-visible law geometry itself; they do not depend on the hidden-feedback ladder analysis of Sections 7-9.

12.2 What is proved and verified: the nonequilibrium analysis

The nonequilibrium analysis in Sections 7-9 is carried out for the hidden-feedback ladder family. Within that family, several statements are exact. At h=0h=0 and λ=0\lambda=0, the activity sign mode is an exact generator eigenmode, the visible tangent line is an exact eigenline of the reduced conjugated generator, the scalar visible precision satisfies Φ=α\Phi=\alpha exactly, and the symmetric-point identities linking Φ\Phi, F0F_{0}, WW, and TT hold exactly. At λ=0\lambda=0 for arbitrary field, the true visible line remains exact, the visible-first reduced basis is exact, and the odd first-correction slope is carried by the canonical hidden scalar JhidJ_{\mathrm{hid}}, which is invariant under orthogonal changes of hidden complement.

The same ladder analysis also contains proved asymptotic statements. In the strong-bias corridor regime at h=0h=0 and λ=0\lambda=0, the reversible visible law, the tangent correction, and the ratio W/TW/T obey the explicit corridor asymptotics stated in Section 9. Those are genuine asymptotic theorems for that regime. They are not merely numerical trends, but they do not imply that the corridor carrier and the fast-memory carrier are one and the same object.

A larger part of the ladder analysis is verified rather than proved. This includes fast-memory homogenisation to a two-state visible chain, convergence of Φ\Phi to the homogenised value, decay of WW in the fast-memory tail, the first-correction structure beyond the leading homogenised rates, the field-normalised source law and its obstruction class, the large-MM normalised odd sector, the timescale-duality profile on the M=1M=1, λ=0\lambda=0, h=0h=0 slice, the EPR-Fisher bounds, endpoint tightness in the slow-memory and fast-memory limits, near-equilibrium scaling, and the small-driving symmetry of WW and TT. Throughout the paper these statements are presented as verified asymptotic or verified structural facts, not as already-promoted theorems.

The benchmark studies of Sections 10 and 11 do not enlarge the theorem boundary. Their role is methodological. They show that the developing algebraic picture was kept tied to a real signal while closure was being pinned down, and they apply adversarial pressure to the visible object and its diagnostics. They support transfer and robustness, but they are not used to convert verified statements into proved ones.

12.3 What remains open

Completion independence of Φ\Phi beyond the proved M=1M=1 case remains open, and this matters because a full visible-law descent theorem would identify the exact minimal visible carrier of the algebraic quantity beyond the scalar benchmark. The multiplicative mechanism behind the λ=0\lambda=0 identities is identified but not yet proved analytically in full Schur-termination form. The field-law package does not yet have sharp operator constants beyond the present obstruction class O((coshh1)/ε)O((\cosh h-1)/\varepsilon).

The large-MM odd sector has a stable asymptotic class in the tested range, but a proved limit theorem and an explicit identification of the limit function remain open. The status of the crossover near μ=1\mu=1 is also open at the operator level: the numerical evidence identifies a change in approach direction, but not yet a deeper structural interpretation. The operator generating the negative even defect has not yet been identified, and its relation, if any, to the odd hidden carrier is not known.

At the level of regime architecture, it remains open whether there exists a higher operator framework that contains both the fast-memory and corridor sectors without erasing their distinction. The EPR-Fisher bound and the M=1M=1 timescale duality are currently verified rather than analytically proved. The full nonlinear Markov re-embedding problem after quotient observation also remains open. Finally, the transfer from the present discrete quotient-visible architecture to any genuine continuum or dynamical gravity theory is open; the paper proves structural parallels only, not a continuum field theory.

12.4 Transfer question

The abstract quotient-visible theory of Sections 2-6 is independent of the hidden-feedback ladder. Its statements are formulated for quotient observation on positive precision operators and therefore transfer at that level without reference to any one benchmark family. The ladder enters only when the paper asks what the visible object looks like inside a nonequilibrium system and how the first correction organises itself.

The analysis of Sections 7-9 is ladder-specific in its present form. The exact symmetry results, the fast-memory source law, the obstruction package, the corridor asymptotics, and the regime-separation statements are established for that family. Sections 10 and 11 then test partial transfer: the archived kinesin and proofreading studies show that the algebraic observables remain meaningful under controlled biochemical observers, the transformed semi-Markov benchmark shows that the visible programme survives a nontrivial observer change, and the falsification battery shows that the diagnostics are not tuned to one toy topology. What those tests do not yet prove is that the ladder-specific correction architecture transfers unchanged to every binary-visible nonequilibrium system.

The paper therefore draws a sharp line. The quotient-visible theory transfers as abstract geometry. The correction architecture is presently established in one benchmark family and partially pressure-tested beyond it. The transfer question is real, and the paper treats it as open where it has not been proved.

12.5 What the present paper does not claim

The paper does not claim a full ontological unification of the fast-memory and corridor regimes.

It does not claim a continuum field theory, a dynamical gravity theory, or an Einstein-equation analogue.

It does not claim a nonlinear Markov re-embedding theorem after quotient observation.

It does not claim a general visible-law descent theorem beyond the proved M=1M=1 scalar case.

13  Discussion

13.1 Why Φ\Phi is the intrinsic visible variable

The central interpretive claim of the paper is now sharp. The intrinsic visible variable is quotient precision Φ\Phi, not the Donsker-Varadhan Hessian taken at fixed visible dimension. The reason is structural, not stylistic. Section 2 proves that quotient observation composes exactly along towers, and Theorem 2.6 makes that closure explicit. Section 3 then shows that the Donsker-Varadhan bridge remains essential, but as a bridge variable: it is the route by which the microscopic skew-square structure descends to a visible algebraic object. What closes under observation is the quotient-visible precision itself. Later work sharpens this boundary further. There is no canonical nontrivial ceiling determined by (H,C)(H,C) alone, so hidden-load and determinant-clock variables become exact only after a ceiling or reference has been declared. By contrast, quotient precision Φ\Phi is intrinsic to the observed pair (H,C)(H,C) itself. This is why the visible variable closes under observation towers, while ceiling-mediated hidden comparison adds further exact structure only after the ambient reference has been fixed.

That distinction is not cosmetic. The tangent closure statement in Corollary 3.5 identifies the Donsker-Varadhan skew-square sector as the tangent microscopic cone inside a larger quotient-visible attenuation class. Section 4 explains the geometry of that larger class by hidden load, support rigidity, additive clock, and conservation. Once those structures are in place, the right reading is forced: the Donsker-Varadhan Hessian is the bridge variable that generates the correct visible object, while Φ\Phi is the visible invariant that survives composition, hidden elimination, and law-level comparison.

At scalar visible rank the conclusion is even stronger. Within that domain, ceiling, clock, precision, clock additivity, and conservation form a closed scalar system. The tangent ceiling fixes where visible correction can live, the determinant clock measures hidden contraction volume, and the conservation split from Section 4 separates reversible and irreversible visible contributions without leaving the quotient-visible framework. In that precise sense, the scalar visible theory is complete: it is not merely a collection of formulas, but a closed algebraic system for the visible object. Conceptually this places the visible side of the theory closer to an information-geometric coarse description than to a fixed-dimension microscopic parametrisation [50, 51, 52].

13.2 What the DV bridge means after quotient reduction

The bridge from Finite is not demoted by the quotient theory. It is repositioned. Before quotient reduction, the bridge organises the microscopic correction as a skew-square law built from the reversible backbone. After quotient reduction, that same bridge is understood as the doorway to the right visible object. It tells us how the microscopic correction enters the visible sector, but it does not itself define the renormalisation-natural invariant. The visible algebraic object of Section 3 is therefore best read as the bridge’s finite descendant, while Φ\Phi is the quotient-theoretic object that remains well defined after observation towers, hidden mediation, and law-level comparison have been taken seriously.

13.3 Apparent nonlinearity as coordinate artefact

Within the paper’s proved domain, apparent nonlinearity repeatedly resolves into one of two things. Either it disappears after the correct coordinate choice, or it reappears as a finite-dimensional algebraic feature with explicit operational meaning. Section 4 is the clearest example. Hidden-load composition looks nonlinear in the raw visible variable XX, but becomes additive transport in the determinant clock and linear order on the hidden-load cone. The same phenomenon appears in Section 6: Bell-square compatibility looks nonlinear in correlator language, but after the arcsine lift the compatible region becomes a hypercubic coordinate constraint with exact repair by clipping. In both cases the apparent nonlinearity is not false, but misplaced. It belongs to the choice of coordinates rather than to the underlying compatibility law.

This claim must be stated with its boundary. The paper does not assert that all nonlinearity in nonequilibrium observation theory is a coordinate artefact. It asserts a narrower and stronger statement: within the quotient-visible theory developed here, every nonlinear structure that has been brought under exact control either linearises in canonical coordinates or reduces to a finite-dimensional algebraic feature with explicit physical meaning. Hidden-load composition, Bell-square compatibility, and the scalar visible Schur laws are the proved examples. Beyond that domain, the paper makes no general ontological claim.

13.4 The multi-regime architecture

One of the paper’s mature conclusions is that the nonequilibrium visible theory is genuinely multi-regime. The abstract quotient-visible theory of Sections 2-6 is exact and regime-independent. The hidden-feedback analysis of Sections 7-9 is not. It splits into an exact symmetry backbone, a fast-memory response sector, and a strong-driving corridor sector. The paper does not hide that separation. It proves it.

That separation is a strength. Section 8 shows that fast-memory response is organised by the visible-first Schur carrier, the canonical odd hidden response scalar, and a source law with explicit obstruction. Section 9 shows that the strong-driving corridor regime is controlled instead by path-kernel endpoint Schur laws and a distinct scaling architecture. The regime-separation theorem, Theorem 9.3, and the current boundary statement in Proposition 9.4 make the point sharply: these are not two parametrisations of one already unified operator sector. They are two real asymptotic sectors with different carriers, different dominant mechanisms, and a currently open containing architecture.

The hidden-feedback ladder therefore teaches two lessons at once. First, the visible object is rigid enough to support exact symmetry laws, asymptotic source laws, regime boundaries, and thermodynamic constraints. Second, those laws do not collapse into one prematurely simplified picture. The theory has become strong enough to prove the separation, and that is a more valuable outcome than a forced unity would have been.

13.5 Geometric structure of quotient observation

The quotient map is also geometric in a precise sense.

{remarkbox}
Remark (Affine-invariant geometric viewpoint).

Equip Sym++(n)\mathrm{Sym}_{++}(n) with the affine-invariant metric

gH(U,V)=tr(H1UH1V).g_{H}(U,V)=\operatorname{tr}(H^{-1}UH^{-1}V).

In the metric-normalised shadow coordinates of Section 2, the differential of

FC(H)=(CH1C𝖳)1F_{C}(H)=(CH^{-1}C^{\mathsf{T}})^{-1}

acts by the coisometric compression of Theorem 2.7. This is the tangent-level isometry condition one would need for a Riemannian-submersion interpretation of quotient observation in the affine-invariant geometry of the positive cone.

That geometric reading is enough for the present paper. A full Riemannian-submersion theorem would additionally require an explicit horizontal distribution, surjectivity of the differential onto the visible tangent space, and a complete metric-preservation argument on horizontal directions. We do not supply that full proof here. What the paper uses is the tangent coisometry and the resulting structural analogy.

It is equally important to state what this does not mean. The determinant clock from Section 4 is not the affine-invariant geodesic distance once visible rank exceeds one. Its additivity comes from multiplicativity of determinant under hidden-load composition, not from metric geodesic length. The geometric parallels do not amount to an Einstein equation, a dynamical gravity theory, or a proved continuum limit. What the paper has established is kinematic geometric structure, not a gravitational dynamics.

13.6 Later exact refinements

Subsequent work sharpens three edges without changing the paper’s main claim. First, common-Hilbert compression identifies the visible metric as the pullback of the quotient norm on least-energy lifts, giving an exact common-Hilbert root for the same quotient-visible object. Second, exact one-generator closure is now classified by common visible Gram factorisation: the generic exact scalar law is a finite Stieltjes sum, while the Möbius law appearing here is the one-pole special case. Third, the descended passive question is closed at the positivity level by a reduced congruence witness after hidden elimination, leaving minimal-memory realisation, rather than positivity inheritance, as the remaining frontier.

The same continuation also shows that support-stable dynamic closure is governed by common invariant-subspace structure for the coupled support-local generator family, and does not alter the quotient-visible theory proved here. It clarifies its continuation: quotient precision remains the intrinsic visible coordinate, while exact closure, passive descent, and stratified transport supply the next algebraic layers beyond the present paper.

Appendix A Bell and temporal frontier details

This appendix provides the technical details underlying Theorem 6.2, Proposition 6.3, Corollary 6.4, and the temporal-frontier discussion in Section 6.

A.1 Gaussian gluing on the Bell square

We first isolate the Gaussian completion problem behind Theorem 6.2. Write

Σxy=(σAx2cxycxyσBy2),Kxy:=cxyσAxσBy,\Sigma_{xy}=\begin{pmatrix}\sigma_{A_{x}}^{2}&c_{xy}\\ c_{xy}&\sigma_{B_{y}}^{2}\end{pmatrix},\qquad K_{xy}:=\frac{c_{xy}}{\sigma_{A_{x}}\sigma_{B_{y}}},

where the one-site variances are assumed to satisfy the remote-setting consistency conditions (6.3). Let 2,2\mathcal{E}_{2,2} denote the bipartite elliptope, namely the set of all 2×22\times 2 matrices of the form

Lxy=uxvywith ux,vy unit vectors in a real Hilbert space.L_{xy}=u_{x}\cdot v_{y}\qquad\text{with }u_{x},v_{y}\text{ unit vectors in a real Hilbert space}.
Proposition A.1 .

Under the variance-consistency conditions (6.3), the following are equivalent.

  1. 1.

    There exists a centred Gaussian law on (A0,A1,B0,B1)(A_{0},A_{1},B_{0},B_{1}) whose (Ax,By)(A_{x},B_{y}) marginals are exactly Σxy\Sigma_{xy}.

  2. 2.

    The normalised cross block K=(Kxy)K=(K_{xy}) belongs to 2,2\mathcal{E}_{2,2}.

If the resulting full covariance is positive definite, this is equivalent to common Schur gluing of the visible pair precisions.

Proof.

Assume first that a common centred Gaussian law exists. After standardising each coordinate by its one-site standard deviation, one obtains a correlation matrix on (A0,A1,B0,B1)(A_{0},A_{1},B_{0},B_{1}) with diagonal entries equal to 11 and cross block equal to KK. Every correlation matrix is positive semidefinite and therefore a Gram matrix of unit vectors. Hence K2,2K\in\mathcal{E}_{2,2}.

Conversely, suppose Kxy=uxvyK_{xy}=u_{x}\cdot v_{y} for unit vectors ux,vyu_{x},v_{y}. Form the block Gram matrix

R:=((uxux)x,x(uxvy)x,y(vyux)y,x(vyvy)y,y)0.R:=\begin{pmatrix}(u_{x}\cdot u_{x^{\prime}})_{x,x^{\prime}}&(u_{x}\cdot v_{y})_{x,y}\\ (v_{y}\cdot u_{x})_{y,x}&(v_{y}\cdot v_{y^{\prime}})_{y,y^{\prime}}\end{pmatrix}\succeq 0.

Now scale RR by the diagonal matrix

D:=diag(σA0,σA1,σB0,σB1).D:=\operatorname{diag}(\sigma_{A_{0}},\sigma_{A_{1}},\sigma_{B_{0}},\sigma_{B_{1}}).

Then Σ:=DRD0\Sigma_{\ast}:=DRD\succeq 0 is a covariance matrix whose (Ax,By)(A_{x},B_{y}) marginal block is exactly Σxy\Sigma_{xy}. If Σ0\Sigma_{\ast}\succ 0, inversion yields a visible precision Q=Σ1Q_{\ast}=\Sigma_{\ast}^{-1}, and each pair precision is the corresponding Schur complement block. This is exactly common Schur gluing. ∎

Proof of Theorem 6.2.

By Proposition A.1, common Gaussian gluing is equivalent to variance consistency together with membership of the normalised cross block KK in 2,2\mathcal{E}_{2,2}. For pair precisions,

Kxy=cxyvxyAvxyB=bxyaxydxy=ρxy,K_{xy}=\frac{c_{xy}}{\sqrt{v^{A}_{xy}v^{B}_{xy}}}=\frac{-b_{xy}}{\sqrt{a_{xy}d_{xy}}}=\rho_{xy},

which is (6.2).

Now define

Exy:=2πarcsin(Kxy).E_{xy}:=\frac{2}{\pi}\arcsin(K_{xy}).

Standard Bell-square facts identify the frontier in three equivalent ways [53]. Fine’s theorem characterises Bell-locality of EE by the CHSH inequalities, the Gaussian sign-correlation formula shows that EE is the correlator table of the signs of a Gaussian family with correlation matrix having cross block KK, and the same lifted correlator set is the relevant bipartite elliptope in the Bell square. Hence K2,2K\in\mathcal{E}_{2,2} if and only if the lifted correlator table EE is Bell-local, equivalently if and only if the four arcsine CHSH inequalities (6.4) to (6.7) hold. Combining this with Proposition A.1 proves the theorem. ∎

A.2 Strict refinement over Bell-locality

Proposition 6.3 already gives the minimal counterexample. The point is structural: Bell inequalities constrain only the binary-output correlator shadow, while common Gaussian gluing constrains the full pair law. The diagonal sector is therefore visible to the quotient frontier even when the Bell shadow is trivial.

A convenient quantitative summary is to separate the two obstructions. Define

εvar:=max{|v00Av01A|,|v10Av11A|,|v00Bv10B|,|v01Bv11B|},\varepsilon_{\mathrm{var}}:=\max\!\bigl\{|v^{A}_{00}-v^{A}_{01}|,|v^{A}_{10}-v^{A}_{11}|,|v^{B}_{00}-v^{B}_{10}|,|v^{B}_{01}-v^{B}_{11}|\bigr\}, (A.1)

and let εCHSH\varepsilon_{\mathrm{CHSH}} be the excess of the largest left-hand side of (6.4) to (6.7) above π\pi, truncated below at zero. Then common gluing on the Bell square is equivalent to the simultaneous vanishing of both obstructions,

εvar=0,εCHSH=0.\varepsilon_{\mathrm{var}}=0,\qquad\varepsilon_{\mathrm{CHSH}}=0.

This packages the Bell-square frontier as a two-coordinate compatibility problem: one coordinate is invisible to Bell correlators, while the other is the usual arcsine correlator obstruction.

A.3 Low-rank mediated Gaussian sign shadows

The Bell-local shadow can itself be realised by a very small mediated Gaussian model.

Corollary A.2 .

Let E=(Exy)E=(E_{xy}) be a Bell-local 2×22\times 2 correlator table, and set

Kxy:=sin(π2Exy).K_{xy}:=\sin\!\Bigl(\frac{\pi}{2}E_{xy}\Bigr).

Then there exist unit vectors u0,u1,v0,v12u_{0},u_{1},v_{0},v_{1}\in\mathbb{R}^{2} and a standard Gaussian ZN(0,I2)Z\sim N(0,I_{2}) such that

Ux:=uxZ,Vy:=vyZ,𝔼[sgn(Ux)sgn(Vy)]=Exyfor all x,y.U_{x}:=u_{x}\cdot Z,\qquad V_{y}:=v_{y}\cdot Z,\qquad\mathbb{E}[\operatorname{sgn}(U_{x})\operatorname{sgn}(V_{y})]=E_{xy}\quad\text{for all }x,y.

Thus every Bell-local Bell-square correlator table already sits inside a rank-two Gaussian sign-shadow.

Proof.

By Theorem 6.2, Bell-locality of EE is equivalent to K2,2K\in\mathcal{E}_{2,2}. Thus there exist unit vectors ux,vyu_{x},v_{y} in some Euclidean space with uxvy=Kxyu_{x}\cdot v_{y}=K_{xy}. Let U:=span{u0,u1}U:=\operatorname{span}\{u_{0},u_{1}\}, so dimU2\dim U\leq 2, and let pyp_{y} be the orthogonal projection of vyv_{y} onto UU. Then uxpy=Kxyu_{x}\cdot p_{y}=K_{xy} for all x,yx,y. Choose ZUN(0,IU)Z_{U}\sim N(0,I_{U}) and independent standard Gaussians ξy\xi_{y}, and define

Ux:=uxZU,Vy:=pyZU+1py2ξy.U_{x}:=u_{x}\cdot Z_{U},\qquad V_{y}:=p_{y}\cdot Z_{U}+\sqrt{1-\|p_{y}\|^{2}}\,\xi_{y}.

These are centred Gaussian variables with unit variances and cross-correlations Corr(Ux,Vy)=Kxy\operatorname{Corr}(U_{x},V_{y})=K_{xy}. The Gaussian sign-correlation formula gives

𝔼[sgn(Ux)sgn(Vy)]=2πarcsin(Kxy)=Exy,\mathbb{E}[\operatorname{sgn}(U_{x})\operatorname{sgn}(V_{y})]=\frac{2}{\pi}\arcsin(K_{xy})=E_{xy},

as required. ∎

A.4 Bell cube normal form and exact repair

The Bell square admits a global normal form in lifted coordinates. This globalises the one-face repair formulas and makes the Bell witness geometry completely explicit.

Theorem A.3 .

Let SS be the 4×44\times 4 matrix whose rows are the four CHSH sign vectors

s1=(1,1,1,1),s2=(1,1,1,1),s3=(1,1,1,1),s4=(1,1,1,1).s_{1}=(1,1,1,-1),\qquad s_{2}=(1,1,-1,1),\qquad s_{3}=(1,-1,1,1),\qquad s_{4}=(-1,1,1,1).

Then

SS=4I4.S^{\top}S=4I_{4}.

For

y:=1πSϕ,ϕ:=(ϕ00,ϕ01,ϕ10,ϕ11),y:=\frac{1}{\pi}S\phi,\qquad\phi:=(\phi_{00},\phi_{01},\phi_{10},\phi_{11})^{\top},

the Bell-compatible region in arcsine coordinates becomes

|yi|1,i=1,,4.|y_{i}|\leq 1,\qquad i=1,\dots,4.

Equivalently, the Bell square is globally the cube [1,1]4[-1,1]^{4} in the lifted coordinates yy. Moreover,

ϕ=π4Sy,δϕ2=π24δy2.\phi=\frac{\pi}{4}S^{\top}y,\qquad\|\delta\phi\|^{2}=\frac{\pi^{2}}{4}\,\|\delta y\|^{2}.

Hence the Euclidean nearest-point map is coordinatewise clipping,

yi=clip(yi,1,1),ϕ=π4Sy,y_{i}^{\ast}=\operatorname{clip}(y_{i},-1,1),\qquad\phi^{\ast}=\frac{\pi}{4}S^{\top}y^{\ast},

and the squared Euclidean distance to the Bell frontier is

dist(ϕ,)2=π24i=14(|yi|1)+2.\operatorname{dist}(\phi,\mathcal{B})^{2}=\frac{\pi^{2}}{4}\sum_{i=1}^{4}(|y_{i}|-1)_{+}^{2}.

If only one lifted CHSH coordinate violates the cube, with defect e>0e>0, then the repair is

δϕ=eπ4si,δϕ=eπ4.\delta\phi^{\ast}=-\frac{e\pi}{4}s_{i},\qquad\|\delta\phi^{\ast}\|_{\infty}=\frac{e\pi}{4}.
Proof.

The four inequalities (6.4) to (6.7) are precisely

|siϕ|π,i=1,,4.|s_{i}\cdot\phi|\leq\pi,\qquad i=1,\dots,4.

Since the rows of SS are the vectors sis_{i}, this is equivalent to |yi|1|y_{i}|\leq 1 for all ii, so the compatible region is the cube [1,1]4[-1,1]^{4} in the lifted coordinates. Direct computation gives SS=4I4S^{\top}S=4I_{4}, hence S1=14SS^{-1}=\frac{1}{4}S^{\top} and therefore

ϕ=π4Sy.\phi=\frac{\pi}{4}S^{\top}y.

The Euclidean metric transforms accordingly,

δϕ2=π216δySSδy=π24δy2,\|\delta\phi\|^{2}=\frac{\pi^{2}}{16}\,\delta y^{\top}SS^{\top}\delta y=\frac{\pi^{2}}{4}\,\|\delta y\|^{2},

because SS=4I4SS^{\top}=4I_{4}. Euclidean nearest-point repair in yy is therefore just coordinatewise clipping to the cube, and transforming back gives the stated projection formula and distance formula. If only one coordinate exceeds the cube by ee, then clipping changes only that coordinate by ee, so

δϕ=π4S(eei)=eπ4si,\delta\phi^{\ast}=\frac{\pi}{4}S^{\top}(-ee_{i})=-\frac{e\pi}{4}s_{i},

which also gives δϕ=eπ/4\|\delta\phi^{\ast}\|_{\infty}=e\pi/4. ∎

Corollary A.4 .

For any covector u4u\in\mathbb{R}^{4}, the Bell support function in arcsine coordinates is

h(u):=supϕuϕ=π4Su1.h_{\mathcal{B}}(u):=\sup_{\phi\in\mathcal{B}}u\cdot\phi=\frac{\pi}{4}\,\|Su\|_{1}.
Proof.

Using ϕ=(π/4)Sy\phi=(\pi/4)S^{\top}y and |yi|1|y_{i}|\leq 1, one has

h(u)=sup|yi|1π4(Su)y=π4i=14|(Su)i|=π4Su1.h_{\mathcal{B}}(u)=\sup_{|y_{i}|\leq 1}\frac{\pi}{4}(Su)\cdot y=\frac{\pi}{4}\sum_{i=1}^{4}|(Su)_{i}|=\frac{\pi}{4}\,\|Su\|_{1}.

A.5 Observation graphs and the first temporal clique

The Bell square is the first nonchordal compatibility graph treated in the main text. The same gluing question may be asked on any finite observation graph, with Bell and temporal contexts appearing as two graph-indexed instances of one Gaussian pair-law completion problem. The next proposition isolates the law-level object.

Proposition A.5 (Graph-indexed Gaussian gluing).

Let G=(V,E)G=(V,E) be a finite graph. For each edge {i,j}E\{i,j\}\in E, let

Σij=(vi(ij)cijcijvj(ij))SPD(2),ρij:=cijvi(ij)vj(ij).\Sigma_{ij}=\begin{pmatrix}v_{i}^{(ij)}&c_{ij}\\ c_{ij}&v_{j}^{(ij)}\end{pmatrix}\in\mathrm{SPD}(2),\qquad\rho_{ij}:=\frac{c_{ij}}{\sqrt{v_{i}^{(ij)}v_{j}^{(ij)}}}.

Then there exists a centred Gaussian law on (Xi)iV(X_{i})_{i\in V} whose (i,j)(i,j) marginal is Σij\Sigma_{ij} for every edge if and only if both of the following hold:

  1. (i)

    vertex variance consistency, namely there exist numbers vi>0v_{i}>0 with

    vi(ij)=vifor every vertex i and every incident edge {i,j};v_{i}^{(ij)}=v_{i}\qquad\text{for every vertex $i$ and every incident edge $\{i,j\}$};
  2. (ii)

    correlation completion, namely there exists a correlation matrix R0R\succeq 0 on VV such that

    Rii=1,Rij=ρijfor all {i,j}E.R_{ii}=1,\qquad R_{ij}=\rho_{ij}\quad\text{for all }\{i,j\}\in E.
Proof.

If a global centred Gaussian law exists, its one-site variances are independent of which edge marginal is inspected, so (i) holds. Dividing the global covariance by the diagonal standard-deviation matrix gives a correlation matrix RR with the stated edge restrictions, so (ii) holds.

Conversely, assume (i) and (ii). Let D=diag(vi)iVD=\operatorname{diag}(v_{i})_{i\in V} and set Σ:=D1/2RD1/2\Sigma:=D^{1/2}RD^{1/2}. Then Σ0\Sigma\succeq 0 and every edge marginal is

Σ{i,j}=(vivivjRijvivjRijvj)=(vi(ij)cijcijvj(ij))=Σij,\Sigma_{\{i,j\}}=\begin{pmatrix}v_{i}&\sqrt{v_{i}v_{j}}\,R_{ij}\\ \sqrt{v_{i}v_{j}}\,R_{ij}&v_{j}\end{pmatrix}=\begin{pmatrix}v_{i}^{(ij)}&c_{ij}\\ c_{ij}&v_{j}^{(ij)}\end{pmatrix}=\Sigma_{ij},

because Rij=ρij=cij/vi(ij)vj(ij)R_{ij}=\rho_{ij}=c_{ij}/\sqrt{v_{i}^{(ij)}v_{j}^{(ij)}} and the visible variances agree by (i). ∎

The contextual object is therefore the edge-correlation completion set

(G):={ρ(1,1)E:ρ extends to a correlation matrix on V}.\mathcal{E}(G):=\{\rho\in(-1,1)^{E}:\rho\text{ extends to a correlation matrix on }V\}.

Bell and temporal inequalities sit below (G)\mathcal{E}(G) as readout shadows. At law level the primary obstruction is gluing failure for the full pair laws.

The next theorem identifies the easy graph class.

Theorem A.6 (Chordal clique gluing).

Let GG be a chordal graph with maximal cliques C1,,CmC_{1},\dots,C_{m}. For each clique CαC_{\alpha}, let νCα\nu_{C_{\alpha}} be a centred Gaussian law with positive definite clique covariance. Assume that whenever two neighbouring cliques in a clique tree meet in a separator S=CαCβS=C_{\alpha}\cap C_{\beta}, the induced SS-marginals of νCα\nu_{C_{\alpha}} and νCβ\nu_{C_{\beta}} agree. Then there exists a centred Gaussian law on all of VV whose CαC_{\alpha}-marginal is νCα\nu_{C_{\alpha}} for every α\alpha.

Proof.

The key separator-gluing step is explicit. If centred Gaussian laws on index sets UU and WW agree on the overlap S=UWS=U\cap W, then

p(xUW)=pU(xU)pW(xW)pS(xS)p(x_{U\cup W})=\frac{p_{U}(x_{U})p_{W}(x_{W})}{p_{S}(x_{S})}

defines a centred Gaussian law on UWU\cup W with the prescribed UU- and WW-marginals. The quotient is well-defined because the overlap marginal agrees, and direct integration recovers the stated marginals.

Now choose a clique tree for GG and argue by induction on the number of cliques. For one clique there is nothing to prove. For more than one clique, remove a leaf clique CC_{\ell} with separator S=CCS=C_{\ell}\cap C^{\prime}. By induction the remaining clique family admits a common Gaussian law. Gluing that law to νC\nu_{C_{\ell}} across SS by the separator formula above produces the desired global Gaussian law. ∎

In particular, if GG is a tree, then the maximal cliques are just edges. Hence edgewise positive pair laws together with vertex variance consistency are sufficient for common Gaussian gluing. Trees therefore have no further law-level obstruction. The first genuinely nontrivial temporal obstruction appears when one passes from a tree to the first temporal clique.

The first fully observed temporal case is the triangle K3K_{3}. Because it is chordal, the correlation-completion condition reduces to positivity of the single 3×33\times 3 correlation matrix.

Theorem A.7 (Exact three-time triangle theorem).

Let Σ01,Σ12,Σ02SPD(2)\Sigma_{01},\Sigma_{12},\Sigma_{02}\in\mathrm{SPD}(2) be centred Gaussian pair laws with entries

Σij=(vi(ij)cijcijvj(ij)),ρij:=cijvi(ij)vj(ij).\Sigma_{ij}=\begin{pmatrix}v_{i}^{(ij)}&c_{ij}\\ c_{ij}&v_{j}^{(ij)}\end{pmatrix},\qquad\rho_{ij}:=\frac{c_{ij}}{\sqrt{v_{i}^{(ij)}v_{j}^{(ij)}}}.

There exists a centred Gaussian law on (X0,X1,X2)(X_{0},X_{1},X_{2}) with these three pair marginals if and only if

v0(01)=v0(02),v1(01)=v1(12),v2(02)=v2(12),v_{0}^{(01)}=v_{0}^{(02)},\qquad v_{1}^{(01)}=v_{1}^{(12)},\qquad v_{2}^{(02)}=v_{2}^{(12)},

and

R=(1ρ01ρ02ρ011ρ12ρ02ρ121)0.R=\begin{pmatrix}1&\rho_{01}&\rho_{02}\\ \rho_{01}&1&\rho_{12}\\ \rho_{02}&\rho_{12}&1\end{pmatrix}\succeq 0.

Equivalently,

1+2ρ01ρ02ρ12ρ012ρ022ρ1220.1+2\rho_{01}\rho_{02}\rho_{12}-\rho_{01}^{2}-\rho_{02}^{2}-\rho_{12}^{2}\geq 0. (A.2)
Proof.

The gluing criterion is Proposition A.5 specialised to G=K3G=K_{3}. For the determinant form, positivity of RR is equivalent to nonnegativity of its determinant because the 1×11\times 1 and 2×22\times 2 principal minors are already positive. A direct computation gives (A.2). ∎

Corollary A.8 (Temporal sign-shadow tetrahedron).

Let (X0,X1,X2)(X_{0},X_{1},X_{2}) be any centred Gaussian triple satisfying Theorem A.7, define Si:=sgn(Xi)S_{i}:=\operatorname{sgn}(X_{i}), and set

yij:=2πarcsin(ρij).y_{ij}:=\frac{2}{\pi}\arcsin(\rho_{ij}).

Then

𝔼[SiSj]=yij,\mathbb{E}[S_{i}S_{j}]=y_{ij},

and the lifted correlator triple (y01,y02,y12)(y_{01},y_{02},y_{12}) lies in the classical three-variable correlation tetrahedron:

1+y01+y02+y12\displaystyle 1+y_{01}+y_{02}+y_{12} 0,\displaystyle\geq 0, (A.3)
1+y01y02y12\displaystyle 1+y_{01}-y_{02}-y_{12} 0,\displaystyle\geq 0, (A.4)
1y01+y02y12\displaystyle 1-y_{01}+y_{02}-y_{12} 0,\displaystyle\geq 0, (A.5)
1y01y02+y12\displaystyle 1-y_{01}-y_{02}+y_{12} 0.\displaystyle\geq 0. (A.6)

In particular, the first temporal lifted shadow is the Leggett-Garg tetrahedron attached to the three-time clique [54].

Proof.

For a centred Gaussian pair with correlation ρij\rho_{ij}, Sheppard’s formula gives

𝔼[sgn(Xi)sgn(Xj)]=2πarcsin(ρij).\mathbb{E}[\operatorname{sgn}(X_{i})\operatorname{sgn}(X_{j})]=\frac{2}{\pi}\arcsin(\rho_{ij}).

The tetrahedral inequalities are the classical three-variable correlation constraints for sign variables [54]. Applying them to (S0,S1,S2)(S_{0},S_{1},S_{2}) yields (A.3)-(A.6). ∎

The temporal tree-versus-clique divide is therefore now visible. Trees glue automatically after repeated-marginal consistency, but they need not determine a unique global law.

Proposition A.9 (Path completion interval and nonuniqueness).

Fix unit variances on the path 0120-1-2 and edge correlations ρ01,ρ12(1,1)\rho_{01},\rho_{12}\in(-1,1). A Gaussian completion exists for every

ρ02[ρ01ρ12(1ρ012)(1ρ122),ρ01ρ12+(1ρ012)(1ρ122)].\rho_{02}\in\Bigl[\rho_{01}\rho_{12}-\sqrt{(1-\rho_{01}^{2})(1-\rho_{12}^{2})},\,\rho_{01}\rho_{12}+\sqrt{(1-\rho_{01}^{2})(1-\rho_{12}^{2})}\Bigr].

This interval is nondegenerate whenever |ρ01|<1|\rho_{01}|<1 and |ρ12|<1|\rho_{12}|<1. The distinguished tree-Markov construction selects the centre point ρ02=ρ01ρ12\rho_{02}=\rho_{01}\rho_{12}.

Proof.

A completion with correlation matrix

R=(1ρ01ρ02ρ011ρ12ρ02ρ121)R=\begin{pmatrix}1&\rho_{01}&\rho_{02}\\ \rho_{01}&1&\rho_{12}\\ \rho_{02}&\rho_{12}&1\end{pmatrix}

exists if and only if R0R\succeq 0. Since the 2×22\times 2 principal minors are positive, this is equivalent to

1+2ρ01ρ12ρ02ρ012ρ122ρ0220.1+2\rho_{01}\rho_{12}\rho_{02}-\rho_{01}^{2}-\rho_{12}^{2}-\rho_{02}^{2}\geq 0.

This is a quadratic inequality in ρ02\rho_{02} with roots

ρ01ρ12±(1ρ012)(1ρ122),\rho_{01}\rho_{12}\pm\sqrt{(1-\rho_{01}^{2})(1-\rho_{12}^{2})},

so the admissible interval is the one stated. Its midpoint is ρ01ρ12\rho_{01}\rho_{12}. ∎

Proposition A.10 (Fibre crossing at fixed correlation shadow).

Let GG have a vertex of degree at least 22, and let ρ(G)\rho\in\mathcal{E}(G) lie in the interior of the correlation-completion set. Then there exist both gluable and non-gluable full edge-law families having the same edge-correlation data ρ\rho.

Proof.

Choose any centred Gaussian completion with unit variances, so each edge block is

Σij=(1ρijρij1)\Sigma_{ij}=\begin{pmatrix}1&\rho_{ij}\\ \rho_{ij}&1\end{pmatrix}

and the family is gluable. Now pick a vertex ii used in at least two edges and choose one incident edge {i,j}\{i,j\}. Replace only the variance of ii on that edge by a number λ1\lambda\neq 1, and replace the covariance on that edge by ρijλ\rho_{ij}\sqrt{\lambda}. The normalised correlation on that edge remains ρij\rho_{ij}, and all other edge correlations are untouched, so the edge-correlation shadow is unchanged. But the variance of vertex ii is now inconsistent across its incident edges, so Proposition A.5 forbids common gluing. ∎

Thus Bell correlators do not exhaust the law-level frontier even before one passes to binary readout inequalities. They are shadows of a fuller pair-law compatibility problem, and the Bell square treated in the main text is the first nonchordal instance of that broader contextual branch.

Appendix B Scalar summaries and Schur-gap diagnostics

This appendix records the minimal scalar diagnostics supporting the Schur-gap discussion in Section 2. No new structure is introduced here.

B.1 Scalar mediation invariants

Let G0G\succeq 0 denote the Schur gap from (2.11). The basic scalar diagnostics are

Γtr:=tr(G),Γop:=Gop,Γdet:=logdetHcomplogdetHquot.\Gamma_{\mathrm{tr}}:=\operatorname{tr}(G),\qquad\Gamma_{\mathrm{op}}:=\|G\|_{\mathrm{op}},\qquad\Gamma_{\det}:=\log\det H_{\mathrm{comp}}-\log\det H_{\mathrm{quot}}. (B.1)

They measure total hidden contribution, maximal hidden contribution, and volumetric hidden contribution, respectively.

Proposition B.1 .

The quantities in (B.1) are all nonnegative.

Proof.

Since G0G\succeq 0, its trace and operator norm are nonnegative. Also HcompHquot0H_{\mathrm{comp}}\succeq H_{\mathrm{quot}}\succ 0 by (2.11), so monotonicity of the determinant on the positive cone gives detHcompdetHquot\det H_{\mathrm{comp}}\geq\det H_{\mathrm{quot}}, hence Γdet0\Gamma_{\det}\geq 0. ∎

{remarkbox}
Remark.

These diagnostics are only summaries. The object itself is the Schur gap operator GG, and the main text uses the scalar summaries only as numerical readers of hidden contribution.

Appendix C Adjacency, fill-in, and locality diagnostics

This appendix provides the service definitions behind the locality discussion in Section 5. It introduces quotient-induced adjacency and the associated fill-in diagnostics, but it does not add any new locality theorem beyond the main text.

C.1 Fibre-induced visible adjacency

To turn adjacency loss into an intrinsic quotient invariant, the visible mask must be induced by quotient geometry rather than chosen externally.

Definition C.1 (Fibre distance and quotient adjacency).

Let π:XY\pi:X\to Y be a quotient of a metric graph or metric state space (X,dX)(X,d_{X}). Define the lifted fibre distance by

dπ(y,y):=inf{dX(u,v):uπ1(y),vπ1(y)}.d_{\pi}(y,y^{\prime}):=\inf\{d_{X}(u,v):u\in\pi^{-1}(y),\ v\in\pi^{-1}(y^{\prime})\}. (C.1)

If upstairs locality has interaction range rr, define visible adjacency by

yπydπ(y,y)r.y\sim_{\pi}y^{\prime}\quad\Longleftrightarrow\quad d_{\pi}(y,y^{\prime})\leq r. (C.2)

Let MπM_{\pi} denote the mask that keeps only matrix entries consistent with (C.2).

Definition C.2 (Locality-defect operator).

Let HvisSPD(Y)H_{\mathrm{vis}}\in\mathrm{SPD}(Y) be a visible precision and let the visible Hilbert structure on YY be fixed once and for all. The quotient locality-defect operator is

𝒩π:=HvisMπ(Hvis).\mathcal{N}_{\pi}:=H_{\mathrm{vis}}-M_{\pi}(H_{\mathrm{vis}}). (C.3)

Its singular values, stable rank, and retained Frobenius mass are the quotient adjacency-loss diagnostics. These are numerical readers of Schur-complement fill-in and spectral complexity in sparse positive systems [39, 28, 55].

Proposition C.3 (Intrinsic diagnostics).

Relative to a fixed visible Hilbert structure and interaction range rr, the singular spectrum of 𝒩π\mathcal{N}_{\pi} and the scalar mediation observables of Appendix B are intrinsic to the quotient construction.

Proof.

Once dπd_{\pi} and rr are fixed, the mask MπM_{\pi} is determined by the quotient itself. The operator 𝒩π\mathcal{N}_{\pi} is then determined by HvisH_{\mathrm{vis}} and the quotient geometry. The scalar observables of Appendix B depend only on the Schur gap (2.11), which is itself determined by the comparison between quotient observation and naive compression. ∎

Appendix D Renewal / transformed semi-coarse-graining benchmark

This appendix supports the transformed semi-coarse-graining test discussed in Section 10. The point of the benchmark is methodological. It sits just beyond the static quotient theorem domain of the main text, but it still yields a tractable visible law. The source model is the four-state benchmark introduced in the transformed semi-coarse-graining study of entropy-production estimation under partial observation by Kapustin, Ghosal, and Bisker [47]. In spirit it belongs near coarse-graining comparisons such as [56], even though the transformed observer here is renewal-level rather than a static state quotient. What matters here is that the transformed observer is not itself a static quotient of the original continuous-time Markov chain, yet the visible law closes far enough to support a finite completion and a genuine benchmark comparison. For basic finite-state chain notation and path-block bookkeeping we follow standard Markov-chain conventions [57].

D.1 Four-state benchmark and transformed observer

Let the original continuous-time Markov chain have states {1,2,3,4}\{1,2,3,4\} with hidden block H={3,4}H=\{3,4\} and rates

12:2ex,14:1,21:3ex,23:2,24:35,1\to 2:2e^{x},\quad 1\to 4:1,\quad 2\to 1:3e^{-x},\quad 2\to 3:2,\quad 2\to 4:35, (D.1)
32:50,34:0.7,41:8,42:0.2,43:75.3\to 2:50,\quad 3\to 4:0.7,\quad 4\to 1:8,\quad 4\to 2:0.2,\quad 4\to 3:75. (D.2)

Following [47], a transformed semi-coarse-grained trajectory groups each completed run of consecutive visits to the hidden macrostate HH into a symbol HnH_{n}, where nn is the number of hidden visits in that run and the waiting time of HnH_{n} is the sum of the waiting times in those nn visits. To keep the previous visible state explicit, write

An:=(1,Hn),Bn:=(2,Hn).A_{n}:=(1,H_{n}),\qquad B_{n}:=(2,H_{n}).

Define

r3:=0.750.7,r4:=7583.2,r:=r3r4.r_{3}:=\frac{0.7}{50.7},\qquad r_{4}:=\frac{75}{83.2},\qquad r:=r_{3}r_{4}. (D.3)

Numerically,

r0.0124459490,Pr(n2enter hidden)=1r0.987554051,Pr(n>4enter hidden)=r21.54901647×104.r\approx 0.0124459490,\qquad\Pr(n\leq 2\mid\text{enter hidden})=1-r\approx 0.987554051,\qquad\Pr(n>4\mid\text{enter hidden})=r^{2}\approx 1.54901647\times 10^{-4}.

Thus the transformed observer is already sharply concentrated on very short hidden excursions.

Proposition D.1 (Exact parity collapse of the transformed sequence law).

For the benchmark (D.1) to (D.3), the countable augmented transformed sequence law on

{1,2}{An,Bn:n1}\{1,2\}\cup\{A_{n},B_{n}:n\geq 1\}

collapses, at the visible-law level, to a four-symbol second-order parity observer with alphabet

𝒴par={Ao,Ae,Bo,Be},\mathcal{Y}_{\mathrm{par}}=\{A_{o},A_{e},B_{o},B_{e}\}, (D.4)

where the previous visible state is retained as the second-order memory coordinate and parity records whether the completed hidden run has odd or even length. Equivalently, after unfolding the previous visible state, one obtains a six-symbol first-order Markov representation. More precisely, conditioned on entry from visible state 11,

Po(1)=1r41r,Pe(1)=r4(1r3)1r,P_{o}^{(1)}=\frac{1-r_{4}}{1-r},\qquad P_{e}^{(1)}=\frac{r_{4}(1-r_{3})}{1-r}, (D.5)

and conditioned on entry from visible state 22,

Po(2)=237(1r3)+3537(1r4)1r,Pe(2)=237r3(1r4)+3537r4(1r3)1r.P_{o}^{(2)}=\frac{\frac{2}{37}(1-r_{3})+\frac{35}{37}(1-r_{4})}{1-r},\qquad P_{e}^{(2)}=\frac{\frac{2}{37}r_{3}(1-r_{4})+\frac{35}{37}r_{4}(1-r_{3})}{1-r}. (D.6)

The next visible state depends on the completed excursion only through the previous visible state and this odd or even parity label.

Proof.

Inside the hidden block the chain alternates between states 33 and 44 until escape to the visible sector. For entry through state 44 the completed excursion exits from hidden state 44 when the number of hidden visits is odd and from hidden state 33 when it is even. The probabilities (D.5) follow by summing the corresponding geometric series. For entry from visible state 22, the first hidden state is a fixed mixture of 33 and 44, and summing the odd and even geometric series gives (D.6). Since the visible return law depends only on the hidden exit microstate, it depends only on previous visible state and parity. ∎

The corresponding visible return probabilities are explicit. In particular,

Ao1 with probability 88.2,Ao2 with probability 0.28.2,Ae2 with probability 1,A_{o}\to 1\text{ with probability }\frac{8}{8.2},\qquad A_{o}\to 2\text{ with probability }\frac{0.2}{8.2},\qquad A_{e}\to 2\text{ with probability }1, (D.7)

and for the BB-symbols,

Pr(1Bo)0.6207014153,Pr(2Bo)0.3792985847,\Pr(1\mid B_{o})\approx 0.6207014153,\qquad\Pr(2\mid B_{o})\approx 0.3792985847, (D.8)
Pr(1Be)8.5325870×105,Pr(2Be)0.9999146741.\Pr(1\mid B_{e})\approx 8.5325870\times 10^{-5},\qquad\Pr(2\mid B_{e})\approx 0.9999146741. (D.9)

Thus the transformed observer exposes the hidden 343\leftrightarrow 4 mode as an almost visible parity channel.

Theorem D.2 (Two-kernel timing collapse).

Let

Li(s):=λiλi+s,λ3=50.7,λ4=83.2.L_{i}(s):=\frac{\lambda_{i}}{\lambda_{i}+s},\qquad\lambda_{3}=50.7,\qquad\lambda_{4}=83.2.

Then the waiting-time transforms of the parity symbols lie exactly in the two-dimensional span generated by

G4,o(s)=(1r)L4(s)1rL3(s)L4(s),G4,e(s)=(1r)L3(s)L4(s)1rL3(s)L4(s).G_{4,o}(s)=\frac{(1-r)L_{4}(s)}{1-rL_{3}(s)L_{4}(s)},\qquad G_{4,e}(s)=\frac{(1-r)L_{3}(s)L_{4}(s)}{1-rL_{3}(s)L_{4}(s)}. (D.10)

More precisely,

G3,o(s)=λ3λ4G4,o(s)+(1λ3λ4)G4,e(s)=3964G4,o(s)+2564G4,e(s),G_{3,o}(s)=\frac{\lambda_{3}}{\lambda_{4}}G_{4,o}(s)+\Bigl(1-\frac{\lambda_{3}}{\lambda_{4}}\Bigr)G_{4,e}(s)=\frac{39}{64}G_{4,o}(s)+\frac{25}{64}G_{4,e}(s), (D.11)
GBo(s)=wG4,o(s)+(1w)G4,e(s),w=1509317593,G_{B_{o}}(s)=w\,G_{4,o}(s)+(1-w)\,G_{4,e}(s),\qquad w=\frac{15093}{17593}, (D.12)

while

GBe(s)=G4,e(s).G_{B_{e}}(s)=G_{4,e}(s). (D.13)

All four transforms therefore share the same quadratic denominator

D(s)=(λ3+s)(λ4+s)rλ3λ4=(λ3+s)(λ4+s)52.5.D(s)=(\lambda_{3}+s)(\lambda_{4}+s)-r\lambda_{3}\lambda_{4}=(\lambda_{3}+s)(\lambda_{4}+s)-52.5. (D.14)
Proof.

The odd and even transforms for entry through state 44 are summed geometric series in the product L3(s)L4(s)L_{3}(s)L_{4}(s), which gives (D.10). Entry through state 33 either exits immediately through 33 or first moves to 44, which yields (D.11). The BB-symbol transforms are then the conditional mixtures induced by the two possible hidden entry microstates, giving (D.12) and (D.13). The common denominator is immediate from (D.10). ∎

Theorem D.2 shows that the hidden timing sector of the transformed observer is not an uncontrolled memory tower. It is exactly two-dimensional at the visible-law level.

Proposition D.3 (Exact finite completion).

The parity-lifted transformed observer admits an explicit finite CTMC completion. One such completion has visible states 1,21,2 together with four hidden phase blocks: a two-state block for AoA_{o}, a two-state block for AeA_{e}, a four-state block for BoB_{o}, and a four-state block for BeB_{e}. The two basic hidden excursion generators are

S(4)=(50.750.7175/16983.2),S^{(4)}=\begin{pmatrix}-50.7&50.7\\ 175/169&-83.2\end{pmatrix}, (D.15)
S(3)=(50.7525/83283.283.2),S^{(3)}=\begin{pmatrix}-50.7&525/832\\ 83.2&-83.2\end{pmatrix}, (D.16)

and the BB-blocks are direct sums of these two generators with the conditional odd or even entry weights. Hence an finite completion exists with total state count 1414.

Proof.

The parity transforms in Theorem D.2 are rational phase-type laws of order at most two [58]. The AA-symbols require one conditioned two-state excursion block each. The BB-symbols are conditional mixtures over the two possible hidden entry microstates, so each is realised exactly by the corresponding direct-sum block. Adding the visible states 1,21,2 gives 2+2+2+4+4=142+2+2+4+4=14 states. ∎

{remarkbox}
Remark (One exact completion and the renewal frontier).

The transformed semi-coarse-graining benchmark works for a structural reason, not because of an accidental good observer choice. In the 4-state benchmark, the hidden 2-state block alternates deterministically, so the transformed sequence law depends only on the parity of the hidden run length, not on the full run length. Proposition D.1 therefore gives a finite parity collapse in the sequence channel. The timing channel also closes: by Theorem D.2, the parity-symbol waiting-time transforms lie in a two-dimensional phase-type span and share a common quadratic denominator, so the transformed timing sector is not an uncontrolled memory tower. Together these two facts show that the transformed visible law is already finite in disguise. The explicit 14-state CTMC construction is therefore not an ad hoc completion but a realisation of an intrinsically finite parity-lifted semi-Markov visible law.

On the explicit 14-state completion from Proposition D.3, the transformed observer has active visible tangent rank 44 and hidden-load rank 22 at the visible stalling point. Numerically,

λ(Ttr)(0,0.81855,0.88615,9.26522,10.93096),\lambda(T_{\mathrm{tr}})\approx(0,0.81855,0.88615,9.26522,10.93096),
λ(Xtr)(0,0.69542,0.85140,8.94220,10.77309),\lambda(X_{\mathrm{tr}})\approx(0,0.69542,0.85140,8.94220,10.77309),
λ(Λtr)(0,0,0.07834,0.19437).\lambda(\Lambda_{\mathrm{tr}})\approx(0,0,0.07834,0.19437).

By contrast, the original full-CG observer on the 4-state chain is only two-dimensional and is already a one-hard-direction quotient observer, with hidden-load spectrum approximately (0,0.274678)(0,0.274678) at stall. This sharpens the true open problem: not whether one finite completion exists, but whether the completion-independent tangent ceiling and hidden-load structure can be fixed directly from the renewal visible law itself rather than from a chosen finite completion. This is the natural extension frontier beyond the static quotient geometry proved in the main text.

Appendix E Blind benchmark diagnostics

This appendix records the auxiliary diagnostics behind the lock-then-reveal benchmark discussed in Section 11. They are included to document how the protocol behaved under finite observation and adaptive reveal, not to enlarge the theorem domain of the paper.

E.1 Exact-ensemble finite-error spread

On the 256-world ensemble, the retained-signal and detectability diagnostics show a nontrivial but controlled finite-error spread across worlds. The important methodological point is not that every world is reconstructed with the same accuracy, but that the ensemble error distribution remains concentrated enough for the finite tangent law to function as an operational discriminator at the level reported in the main text. This is the diagnostic content that underlay the ensemble error histograms in the archive.

E.2 Adaptive reveal as a diagnostic frontier

The adaptive-reveal experiment was run as a secondary check on whether theorem-targeted observation can improve the operational signal. On the 64-world diagnostic panel, the oracle theorem-target reveal improved the mean second-step revealed signal relative to the random baseline. The same comparison in the normalised detectability score was again positive, but smaller. This is why Section 11 treats adaptive reveal as a diagnostic frontier rather than as a new theorem-bearing claim: the gain is real, but it belongs to the protocol layer, not to the intrinsic quotient-visible law.

E.3 Exact versus sampled Bell verdicts

The Bell-facing part of the blind benchmark was evaluated in both law-level and sampled modes. On the recorded hero families, law-level verdict recovery cleanly identified the glueable versus non-glueable cases at the law level. The sampled mode was materially weaker and missed the glueable families on the recorded benchmark, which is why the paper treats the Bell verdict as a law-level statement and uses the sampled track only as a robustness layer. This is the boundary that matters for interpretation: the lock-then-reveal protocol works as a test of the law-level compatibility machinery, but not yet as a theorem-safe sampled Bell pipeline.

Appendix F Methodological bridges and limits of the positive-survivor programme

This appendix retains one methodological bridge only, namely the distinction between structural and practical identifiability. Its role is to support the transfer boundary stated in Section 12: neighbouring hidden-to-visible problems can exhibit the same survivor logic without thereby falling inside the theorem domain of the present paper. What is claimed here is limited and explicit. A regular structural quotient carries the descended Fisher form, enlarging the admissible experiment class sharpens that quotient, and the hidden-load geometry from the main text gives a finite-dimensional instance of the same split. What is not claimed is a universal theorem unifying all hidden-to-visible reductions.

F.1 Bridge A: structural versus practical identifiability

Let Θ\Theta be a smooth parameter manifold, let \mathcal{E} be an admissible experiment class, and for each EE\in\mathcal{E} let

pE(zθ)p_{E}(z\mid\theta)

be the observational law. Define structural equivalence relative to \mathcal{E} by

θθpE(θ)=pE(θ)for all E.\theta\sim\theta^{\prime}\quad\Longleftrightarrow\quad p_{E}(\cdot\mid\theta)=p_{E}(\cdot\mid\theta^{\prime})\ \text{for all }E\in\mathcal{E}.

Assume that near a regular point the equivalence classes form a smooth quotient manifold

q:ΘΘ¯:=Θ/.q:\Theta\to\bar{\Theta}:=\Theta/\!\sim.

For a fixed experiment EE, let IE(θ)I_{E}(\theta) denote the Fisher information bilinear form on TθΘT_{\theta}\Theta.

Theorem F.1 .

Under the regular quotient hypothesis, each experiment EE\in\mathcal{E} factors uniquely through the quotient: there exists a reduced statistical model

p¯E(zθ¯),θ¯Θ¯,\bar{p}_{E}(z\mid\bar{\theta}),\qquad\bar{\theta}\in\bar{\Theta},

such that

pE(zθ)=p¯E(zq(θ)).p_{E}(z\mid\theta)=\bar{p}_{E}(z\mid q(\theta)).

Moreover:

  1. 1.

    for every vertical vector vkerdqθv\in\ker dq_{\theta}, the score annihilates,

    vlogpE(zθ)=0;\partial_{v}\log p_{E}(z\mid\theta)=0;
  2. 2.

    the Fisher form vanishes on vertical directions and descends uniquely to a bilinear form I¯E\bar{I}_{E} on Tq(θ)Θ¯T_{q(\theta)}\bar{\Theta} satisfying

    IE(θ)(u,w)=I¯E(q(θ))(dqθu,dqθw);I_{E}(\theta)(u,w)=\bar{I}_{E}(q(\theta))(dq_{\theta}u,dq_{\theta}w);
  3. 3.

    structural nonidentifiability is the vertical degeneracy of qq, while practical nonidentifiability for a given experiment is degeneracy or strong anisotropy of the descended form I¯E\bar{I}_{E} on the quotient tangent.

Proof.

By definition, each pE(θ)p_{E}(\cdot\mid\theta) is constant on every structural fibre, so it depends only on q(θ)q(\theta); this gives the unique reduced model. Differentiating the factorisation along a vertical vector vkerdqθv\in\ker dq_{\theta} gives the score annihilation. The Fisher identity then shows that IE(θ)(v,)=0I_{E}(\theta)(v,\cdot)=0, so IE(θ)I_{E}(\theta) depends only on quotient tangent classes and therefore descends uniquely to I¯E\bar{I}_{E}. ∎

The theorem is local rather than global. It says that the correct canonical object is not a matrix written in some auxiliary horizontal complement, but the descended bilinear form on the structural quotient itself. A direct consequence is that enlarging the admissible experiment class can only refine the quotient and remove vertical directions; it cannot create a new structural fibre.

Proposition F.2 .

Let 12\mathcal{E}_{1}\subseteq\mathcal{E}_{2} be two experiment classes, and assume both regular quotients exist near the point of interest:

qi:ΘΘ¯i=Θ/i,i=1,2.q_{i}:\Theta\to\bar{\Theta}_{i}=\Theta/\!\sim_{i},\qquad i=1,2.

Then there exists a unique local surjection π:Θ¯2Θ¯1\pi:\bar{\Theta}_{2}\to\bar{\Theta}_{1} such that

q1=πq2.q_{1}=\pi\circ q_{2}.

For every experiment E1E\in\mathcal{E}_{1}, the descended Fisher forms satisfy the pullback relation

I¯E(2)=πI¯E(1).\bar{I}_{E}^{(2)}=\pi^{*}\bar{I}_{E}^{(1)}.

Hence enlarging the experiment class can only sharpen the quotient geometry.

Proof.

If two parameters are equivalent for the larger class 2\mathcal{E}_{2}, they are equivalent for the smaller class 1\mathcal{E}_{1}. Therefore every 2\sim_{2}-class sits inside a 1\sim_{1}-class, which induces the unique local map π\pi with q1=πq2q_{1}=\pi\circ q_{2}. The Fisher pullback identity then follows from Theorem F.1 applied to the factorisation of the statistical model through the two quotients. ∎

A canonical toy model is the scalar decay law

x˙=kx,Yi=cx0ekti+εi,εi𝒩(0,σ2),\dot{x}=-kx,\qquad Y_{i}=cx_{0}e^{-kt_{i}}+\varepsilon_{i},\qquad\varepsilon_{i}\sim\mathcal{N}(0,\sigma^{2}),

with parameters (c,x0,k)(c,x_{0},k). The full observational law depends only on a=cx0a=cx_{0} and kk, so the structural fibres are

(c,x0,k)(λc,x0/λ,k),λ>0.(c,x_{0},k)\sim(\lambda c,x_{0}/\lambda,k),\qquad\lambda>0.

The quotient is therefore two-dimensional with coordinates (a,k)(a,k), and the quotient Fisher form is the Fisher matrix of the reduced mean model aektiae^{-kt_{i}}. This shows in one line that a direction can be structurally invisible upstairs while the remaining quotient directions are still experiment-dependent in visibility.

In the present quotient setting this split becomes finite-dimensional rather than merely local.

Theorem F.3 (Exact inverse split for the hidden-load class).

Let T0T\succeq 0 and let S:=Ran(T)S:=\operatorname{Ran}(T). Let XX be a visible law in the support-preserving interior beneath TT, so that by Theorem 4.4

X=T1/2(IS+Λ)1T1/2,Λ0 on S.X=T^{1/2}(I_{S}+\Lambda)^{-1}T^{1/2},\qquad\Lambda\succeq 0\text{ on }S.

Then:

  1. (i)

    conditional on the tangent ceiling TT, the hidden-load operator is uniquely identified by XX and equals

    Λ=(T|S)1/2(X|S)1(T|S)1/2IS;\Lambda=(T|_{S})^{1/2}(X|_{S})^{-1}(T|_{S})^{1/2}-I_{S}; (F.1)

    moreover,

    rank(Λ)=rank(TX),logdet(IS+Λ)=logpdet(T)logpdet(X);\operatorname{rank}(\Lambda)=\operatorname{rank}(T-X),\qquad\log\det(I_{S}+\Lambda)=\log\operatorname{pdet}(T)-\log\operatorname{pdet}(X);
  2. (ii)

    without an independently fixed ceiling, XX alone does not identify a unique hidden load: for every TXT^{\prime}\succeq X with Ran(T)=S\operatorname{Ran}(T^{\prime})=S, there exists a unique ΛT0\Lambda_{T^{\prime}}\succeq 0 on SS such that

    X=T1/2(IS+ΛT)1T1/2,ΛT=(T|S)1/2(X|S)1(T|S)1/2IS.X=T^{\prime 1/2}(I_{S}+\Lambda_{T^{\prime}})^{-1}T^{\prime 1/2},\qquad\Lambda_{T^{\prime}}=(T^{\prime}|_{S})^{1/2}(X|_{S})^{-1}(T^{\prime}|_{S})^{1/2}-I_{S}.

    Hence XX determines a full ceiling cone of compatible ceiling-load explanations.

Proof.

Part (i) is the explicit recovery formula already built into Theorem 4.4. The rank and determinant identities are Corollary 4.7.

For part (ii), fix TXT^{\prime}\succeq X on the same support SS and define ΛT\Lambda_{T^{\prime}} by the displayed formula. Then

T1/2XT1/2IS.T^{\prime-1/2}XT^{\prime-1/2}\preceq I_{S}.

Since inversion reverses Loewner order on positive definite operators,

(T1/2XT1/2)1IS,(T^{\prime-1/2}XT^{\prime-1/2})^{-1}\succeq I_{S},

so ΛT0\Lambda_{T^{\prime}}\succeq 0. Rearranging gives the stated representation of XX, and uniqueness follows because T1/2XT1/2=(IS+ΛT)1T^{\prime-1/2}XT^{\prime-1/2}=(I_{S}+\Lambda_{T^{\prime}})^{-1}. ∎

Combined with Corollary 4.5, this gives the order reversal at fixed ceiling:

X1X0Λ1Λ0.X_{1}\preceq X_{0}\quad\Longleftrightarrow\quad\Lambda_{1}\succeq\Lambda_{0}.

It also gives the zero-load boundary Λ=0X=T\Lambda=0\Longleftrightarrow X=T.

Proposition F.4 (Gram rigidity and hidden-factor gauge).

Fix TT and XX and let Λ\Lambda be the uniquely identified hidden-load operator from Theorem F.3. Write r:=rank(Λ)r:=\operatorname{rank}(\Lambda). Then every minimal hidden realisation is a Gram factorisation

Λ=BB,B|S|×r,\Lambda=BB^{\top},\qquad B\in\mathbb{R}^{|S|\times r},

and if B,B|S|×rB,B^{\prime}\in\mathbb{R}^{|S|\times r} both have full column rank and satisfy BB=BB=ΛBB^{\top}=B^{\prime}B^{\prime\top}=\Lambda, then

B=BQB^{\prime}=BQ

for some orthogonal matrix QO(r)Q\in O(r). Consequently (T,X)(T,X) identifies the hidden Gram operator and its intrinsic invariants, but not a unique hidden basis, hidden factorisation, or hidden sparsity pattern.

Proof.

The existence of a minimal factorisation follows from Theorem 4.6. Assume BB=BB=ΛBB^{\top}=B^{\prime}B^{\prime\top}=\Lambda with both factors of column rank rr, and define

Q:=B+B,B+=(BB)1B.Q:=B^{+}B^{\prime},\qquad B^{+}=(B^{\top}B)^{-1}B^{\top}.

Because Ran(B)=Ran(Λ)=Ran(B)\operatorname{Ran}(B)=\operatorname{Ran}(\Lambda)=\operatorname{Ran}(B^{\prime}), one has

BQ=BB+B=B.BQ=BB^{+}B^{\prime}=B^{\prime}.

Moreover,

QQ=B+BB(B+)=B+Λ(B+)=B+BB(B+)=Ir.QQ^{\top}=B^{+}B^{\prime}B^{\prime\top}(B^{+})^{\top}=B^{+}\Lambda(B^{+})^{\top}=B^{+}BB^{\top}(B^{+})^{\top}=I_{r}.

Since QQ is an r×rr\times r matrix, QQ=IrQQ^{\top}=I_{r} implies QO(r)Q\in O(r). Hence B=BQB^{\prime}=BQ. ∎

References

  • M. D. Donsker and S. R. S. Varadhan [1975a] M. D. Donsker and S. R. S. Varadhan. Asymptotic evaluation of certain Markov process expectations for large time. I, 1975a. Communications on Pure and Applied Mathematics, 28:1-47, 1975.
  • M. D. Donsker and S. R. S. Varadhan [1975b] M. D. Donsker and S. R. S. Varadhan. Asymptotic evaluation of certain Markov process expectations for large time. II, 1975b. Communications on Pure and Applied Mathematics, 28:279-301, 1975.
  • M. D. Donsker and S. R. S. Varadhan [1976] M. D. Donsker and S. R. S. Varadhan. Asymptotic evaluation of certain Markov process expectations for large time. III, 1976. Communications on Pure and Applied Mathematics, 29(4):389-461, 1976.
  • R. S. Ellis [2006] R. S. Ellis. Entropy, Large Deviations, and Statistical Mechanics, 2006. Grundlehren der mathematischen Wissenschaften, Vol. 271, Springer, 1985. Reprinted as Classics in Mathematics, 2006.
  • H. Touchette [2009] H. Touchette. The large deviation approach to statistical mechanics, 2009. Physics Reports, 478:1-69, 2009.
  • L. Bertini et al. [2015] L. Bertini, A. Faggionato, and D. Gabrielli. Large deviations of the empirical flow for continuous time Markov chains, 2015. Annales de l’I.H.P. Probabilités et Statistiques, 51(3):867-900, 2015.
  • J. R. Dunkley [2026] J. R. Dunkley. Finite Observation: A Spectral Theory of Nonequilibrium Visibility, 2026. Preprint, 2026.
  • J. Schnakenberg [1976] J. Schnakenberg. Network theory of microscopic and macroscopic behavior of master equation systems, 1976. Reviews of Modern Physics, 48:571-585, 1976.
  • J. L. Lebowitz and H. Spohn [1999] J. L. Lebowitz and H. Spohn. A Gallavotti-Cohen-type symmetry in the large deviation functional for stochastic dynamics, 1999. Journal of Statistical Physics, 95:333-365, 1999.
  • U. Seifert [2012] U. Seifert. Stochastic thermodynamics, fluctuation theorems and molecular machines, 2012. Reports on Progress in Physics, 75:126001, 2012.
  • M. Esposito [2012] M. Esposito. Stochastic thermodynamics under coarse graining, 2012. Physical Review E, 85:041125, 2012.
  • C. Maes [2020] C. Maes. Frenesy: time-symmetric dynamical activity in nonequilibria, 2020. Physics Reports, 850:1-33, 2020.
  • I. Schur [1917] I. Schur. Über Potenzreihen, die im Innern des Einheitskreises beschränkt sind, 1917. Journal für die reine und angewandte Mathematik, 147:205-232, 1917.
  • W. N. Anderson and Jr [1971] W. N. Anderson and Jr. Shorted operators, 1971. SIAM Journal on Applied Mathematics, 20(3):520-525, 1971.
  • W. N. Anderson, Jr. and R. J. Duffin [1969] W. N. Anderson, Jr. and R. J. Duffin. Series and parallel addition of matrices, 1969. Journal of Mathematical Analysis and Applications, 26(3):576-594, 1969.
  • W. N. Anderson, Jr. and G. E. Trapp [1975] W. N. Anderson, Jr. and G. E. Trapp. Shorted operators. II, 1975. SIAM Journal on Applied Mathematics, 28(1):60-71, 1975.
  • R. Bhatia [2007] R. Bhatia. Positive Definite Matrices, 2007. Princeton University Press, 2007.
  • K. Löwner [1934] K. Löwner. Über monotone Matrixfunktionen, 1934. Mathematische Zeitschrift, 38:177-216, 1934.
  • T. Ando [1979] T. Ando. Concavity of certain maps on positive definite matrices and applications to Hadamard products, 1979. Linear Algebra and Its Applications, 26:203-241, 1979.
  • F. Hansen and G. K. Pedersen [1982] F. Hansen and G. K. Pedersen. Jensen’s inequality for operators and Löwner’s theorem, 1982. Mathematische Annalen, 258(3):229-241, 1982.
  • R. Bhatia [1997] R. Bhatia. Matrix Analysis, 1997. Graduate Texts in Mathematics, Vol. 169, Springer, 1997.
  • F. Kubo and T. Ando [1980] F. Kubo and T. Ando. Means of positive linear operators, 1980. Mathematische Annalen, 246:205-224, 1980.
  • W. Pusz and S. L. Woronowicz [1975] W. Pusz and S. L. Woronowicz. Functional calculus for sesquilinear forms and the purification map, 1975. Reports on Mathematical Physics, 8(2):159-170, 1975.
  • L. P. Kadanoff [1966] L. P. Kadanoff. Scaling laws for Ising models near Tc{T}_{c}, 1966. Physics Physique Fizika, 2:263-272, 1966.
  • K. G. Wilson and J. Kogut [1974] K. G. Wilson and J. Kogut. The renormalization group and the ε\varepsilon expansion, 1974. Physics Reports, 12(2):75-200, 1974.
  • J. Polchinski [1984] J. Polchinski. Renormalization and effective Lagrangians, 1984. Nuclear Physics B, 231(2):269-295, 1984.
  • K. Fan [1951] K. Fan. Maximum properties and inequalities for the eigenvalues of completely continuous operators, 1951. Proceedings of the National Academy of Sciences, 37:760-766, 1951.
  • R. A. Horn and C. R. Johnson [2013] R. A. Horn and C. R. Johnson. Matrix Analysis, 2013. Cambridge University Press, second edition, 2013.
  • F. Zhang and editor [2005] F. Zhang and editor. The Schur Complement and Its Applications, 2005. Springer, New York, 2005.
  • E. V. Haynsworth [1968] E. V. Haynsworth. On the Schur complement, 1968. Basel Mathematical Notes, BMN 20, 1968.
  • D. Carlson et al. [1974] D. Carlson, E. Haynsworth, and T. Markham. A generalization of the Schur complement by means of the Moore-Penrose inverse, 1974. SIAM Journal on Applied Mathematics, 26(1):169-175, 1974.
  • E. B. Bogomol’nyi [1976] E. B. Bogomol’nyi. Stability of classical solutions, 1976. Soviet Journal of Nuclear Physics, 24(4):449-454, 1976.
  • A. P. Dempster [1972] A. P. Dempster. Covariance selection, 1972. Biometrics, 28:157-175, 1972.
  • S. L. Lauritzen [1996] S. L. Lauritzen. Graphical Models, 1996. Oxford Statistical Science Series, No. 17, Oxford University Press, 1996.
  • V. Chandrasekaran et al. [2012] V. Chandrasekaran, P. A. Parrilo, and A. S. Willsky. Latent variable graphical model selection via convex optimization, 2012. The Annals of Statistics, 40(4):1935-1967, 2012.
  • R. Grone et al. [1984] R. Grone, C. R. Johnson, E. M. Sá, and H. Wolkowicz. Positive definite completions of partial Hermitian matrices, 1984. Linear Algebra and Its Applications, 58:109-124, 1984.
  • J. Williamson [1936] J. Williamson. On the algebraic problem concerning the normal forms of linear dynamical systems, 1936. American Journal of Mathematics, 58(1):141-163, 1936.
  • R. A. Horn and C. R. Johnson [1991] R. A. Horn and C. R. Johnson. Topics in Matrix Analysis, 1991. Cambridge University Press, 1991.
  • A. George and J. W. H. Liu [1981] A. George and J. W. H. Liu. Computer Solution of Large Sparse Positive Definite Systems, 1981. Prentice-Hall, Englewood Cliffs, NJ, 1981.
  • P. G. Doyle and J. L. Snell [1984] P. G. Doyle and J. L. Snell. Random Walks and Electric Networks, 1984. Carus Mathematical Monographs, Vol. 22, Mathematical Association of America, 1984.
  • D. M. Malioutov et al. [2006] D. M. Malioutov, J. K. Johnson, and A. S. Willsky. Walk-sums and belief propagation in Gaussian graphical models, 2006. Journal of Machine Learning Research, 7:2031-2064, 2006.
  • S. Demko et al. [1984] S. Demko, W. F. Moss, and P. W. Smith. Decay rates for inverses of band matrices, 1984. Mathematics of Computation, 43(168):491-499, 1984.
  • M. Benzi and G. H. Golub [1999] M. Benzi and G. H. Golub. Bounds for the entries of matrix functions with applications to preconditioning, 1999. BIT Numerical Mathematics, 39(3):417-438, 1999.
  • M. Benzi and N. Razouk [2007] M. Benzi and N. Razouk. Decay bounds and O(n) algorithms for approximating functions of sparse matrices, 2007. Electronic Transactions on Numerical Analysis, 28:16-39, 2007.
  • T. J. Rivlin [1990] T. J. Rivlin. Chebyshev Polynomials: From Approximation Theory to Algebra and Number Theory, 1990. Wiley, 1974; second edition, 1990.
  • L. N. Trefethen [2013] L. N. Trefethen. Approximation Theory and Approximation Practice, 2013. SIAM, Philadelphia, 2013.
  • U. Kapustin et al. [2024] U. Kapustin, A. Ghosal, and G. Bisker. Utilizing time-series measurements for entropy-production estimation in partially observed systems, 2024. Physical Review Research, 6:023039, 2024.
  • Liepelt and Lipowsky [2007] A. D. Liepelt and R. Lipowsky. Kinesin’s network of chemomechanical motor cycles. Physical Review Letters, 98(25):258102, 2007.
  • Banerjee et al. [2017] S. Banerjee, A. B. Kolomeisky, and O. A. Igoshin. Elucidating interplay of speed and accuracy in biological error correction, 2017. Proceedings of the National Academy of Sciences, 114(20):5183-5188, 2017.
  • C. R. Rao [1945] C. R. Rao. Information and accuracy attainable in the estimation of statistical parameters, 1945. Bulletin of the Calcutta Mathematical Society, 37:81-91, 1945.
  • S. Amari and H. Nagaoka [2000] S. Amari and H. Nagaoka. Methods of Information Geometry, 2000. Translations of Mathematical Monographs, Vol. 191, American Mathematical Society, 2000.
  • N. Ay et al. [2017] N. Ay, J. Jost, H. V. Lê, and L. Schwachhöfer. Information Geometry, 2017. Ergebnisse der Mathematik und ihrer Grenzgebiete, Vol. 64, Springer, 2017.
  • [53] A. Fine. Hidden variables, joint probability, and the Bell inequalities. Journal of Mathematical Physics, 23(7):1306-1310, 1982.
  • [54] A. J. Leggett and A. Garg. Quantum mechanics versus macroscopic realism: is the flux there when nobody looks? Physical Review Letters, 54(9):857-860, 1985.
  • M. Rudelson and R. Vershynin [2007] M. Rudelson and R. Vershynin. Sampling from large matrices: an approach through geometric functional analysis, 2007. Journal of the ACM, 54(4), Article 21, 2007.
  • G. Teza and A. L. Stella [2020] G. Teza and A. L. Stella. Exact coarse graining preserves entropy production out of equilibrium, 2020. Physical Review Letters, 125:110601, 2020.
  • J. G. Kemeny and J. L. Snell [1960] J. G. Kemeny and J. L. Snell. Finite Markov Chains, 1960. Springer-Verlag, 1976. Originally published by D. Van Nostrand, 1960.
  • P. Buchholz [1994] P. Buchholz. Exact and ordinary lumpability in finite Markov chains, 1994. Journal of Applied Probability, 31:59-75, 1994.