Quotient Observation
Hidden Locality, Schur Mediation, and Visible Precision Geometry
Abstract
We study what can be recovered under partial observation and argue that the intrinsic visible object is quotient-visible precision, denoted Phi, rather than the Donsker-Varadhan Hessian itself. The paper develops a finite, compositional theory of this visible object on the positive cone of precision operators. We prove that quotient observation composes along towers of observation, identify the visible algebraic descendant of the bridge developed in Finite, and show that in the scalar visible case the resulting structure closes into a closed system of precision, clock, transport, and conservation laws. This yields a picture of hidden mediation, including support rigidity, a hidden-load parametrisation, a unique additive interior clock, and a sharp distinction between quotient observation and naive compression. We then turn to nonequilibrium systems and analyse how the visible object is realised in practice. At a symmetry point we obtain a canonical hidden response carrier and a scalar collapse. Away from that point we identify a fast-memory response layer with a two-state homogenised limit, a first-correction Schur carrier, and a source law with an explicit finite-epsilon obstruction. In a separate strong-bias corridor regime we derive a different asymptotic sector and show that these regimes are both real and not presently unified by a single higher operator architecture. The theory is tested against a sequence of benchmark systems used to keep the developing framework tied to a real signal while algebraic closure was being pinned down. These include kinesin, proofreading, transformed semi-Markov, and hidden-feedback ladder tests. Together they support the central claim that quotient-visible precision is the renormalisation-natural visible invariant, while also making the present transfer boundaries explicit. The result is a finished quotient-visible core theory together with a sharply delimited correction-layer package, a falsification battery, and a clear map of what remains open.
Contents
section.1subsection.1.1subsection.1.2subsection.1.3subsection.1.4subsection.1.5section.2subsection.2.1subsection.2.2subsection.2.3subsection.2.4subsection.2.5section.3subsection.3.1subsection.3.2subsection.3.3subsection.3.4subsection.3.5subsection.3.6section.4subsection.4.1subsection.4.2subsection.4.3subsection.4.4subsection.4.5section.5subsection.5.1subsection.5.2subsection.5.3subsection.5.4section.6subsection.6.1subsection.6.2subsection.6.3subsection.6.4section.7subsection.7.1subsection.7.2subsection.7.3subsection.7.4section.8subsection.8.1subsection.8.2subsection.8.3subsection.8.4subsection.8.5subsection.8.6section.9subsection.9.1subsection.9.2subsection.9.3subsection.9.4section.10subsection.10.1subsection.10.2subsection.10.3subsection.10.4subsection.10.5subsection.10.6section.11subsection.11.1subsection.11.2subsection.11.3section.12subsection.12.1subsection.12.2subsection.12.3subsection.12.4subsection.12.5section.13subsection.13.1subsection.13.2subsection.13.3subsection.13.4subsection.13.5subsection.13.6appendix.Asubsection.A.1subsection.A.2subsection.A.3subsection.A.4subsection.A.5appendix.Bsubsection.B.1appendix.Csubsection.C.1appendix.Dsubsection.D.1appendix.Esubsection.E.1subsection.E.2subsection.E.3appendix.Fsubsection.F.1
1 Introduction
1.1 The observation problem
Given that you only see part of a system, what can you recover about its internal structure?
A Markov process runs on states; an observer sees only the image under a linear surjection with . The question is, what quadratic structure on the visible sector is canonically determined by the full precision and the observation map, with no further choices?
Here we push the full precision through the observation constraint and extract the unique visible quadratic form that records the minimum energy required to realise each visible displacement. The result is a definite positive operator on the visible sector, the quotient-visible precision , and it is this operator that is the natural visible invariant.
The setting is the Donsker-Varadhan large-deviation geometry of empirical flows in finite-state Markov chains, [1, 2, 3, 4, 5, 6] following our earlier work [7] which established a finite quadratic bridge between the stationary backbone and the nonequilibrium Hessian. It also sits naturally alongside the network and stochastic-thermodynamic description of nonequilibrium observables [8, 9, 10, 11, 12]. Now we ask, what does that bridge produce once hidden degrees of freedom are eliminated by quotient observation?
1.2 Main claim and conceptual picture
The central claim is that is the intrinsic visible variable. It is defined variationally, it composes along towers of observation, it admits a stable first-order calculus, and it is provably different from compression. No other candidate satisfies all properties simultaneously:
The Donsker-Varadhan bridge [7] identifies a finite visible algebraic object, the tangent descendant of , but it is itself that closes under observation. The Hessian is a bridge object: it matters because it leads to . More precisely, once the tangent ceiling has been fixed on the part of visible space where it acts nontrivially, the exact observed class consists of all visible laws obtained by contracting within that same active sector, without ever creating new visible directions. Finite hidden sectors realise the strict interior of that class, while allowing limits adds the boundary cases. Section 4 makes this precise.
The paper contains two species of results. The first is an algebraic theory of the visible object: its variational characterisation, composition law, conservation structure, hidden-load parametrisation, and graph-local decay. These hold for any quotient observation on any positive precision operator.
The second evaluates this theory in specific nonequilibrium systems: symmetry theorems, fast-memory homogenisation, corridor asymptotics, and thermodynamic constraints. The boundary between the two is maintained throughout.
1.3 Main results
The paper establishes the following results, listed in the order they appear.
-
(i)
Quotient observation on the positive cone is variational, composes along observation towers, and produces a coisometric tangent transport with monotone Ky Fan detectability envelopes.
-
(ii)
The Donsker-Varadhan bridge produces a finite visible algebraic object via quotient reduction. The first genuinely new quotient effect beyond the tangent law is quartic and sign-definite; smooth divergence functionals built from the visible shadow lose only at sextic order.
-
(iii)
In scalar visible rank, the visible precision admits a generator-level Schur simplification and does not depend on the hidden completion at the matched visible-law level.
-
(iv)
The visible precision splits as , with the reversible backbone contribution and the irreversible correction. This conservation identity holds without remainder.
-
(v)
Hidden mediation is parametrised by a positive hidden-load operator on the tangent support. Sequential transport, a unique additive determinant clock, and support rigidity follow.
-
(vi)
Graph-local decay of hidden contributions: the visible effect of a hidden perturbation decays with the graph distance between the perturbation site and the visible sector.
-
(vii)
On the Bell square, common-cause visible Gaussian gluing is a law-level compatibility problem whose frontier has two independent coordinates.
-
(viii)
At the symmetric point of the two-state visible ladder, a symmetry theorem identifies a canonical hidden response carrier, and the visible algebra collapses to one free parameter: and .
-
(ix)
Fast-memory homogenisation yields a source law and an explicit obstruction to hidden-structure recovery.
-
(x)
Corridor asymptotics separate three regimes (fast memory, intermediate, slow memory) with sharp crossover diagnostics.
-
(xi)
A thermodynamic ceiling constrains visible precision: , where is the entropy production rate.
-
(xii)
Timescale duality, the EPR-Fisher bound, and tightness at both timescale limits constrain the visible object within a closed region of parameter space.
1.4 Roadmap
Section 2 formulates quotient observation on the positive cone, proves the variational characterisation and the Fréchet calculus, establishes tower composition, identifies the Schur gap, and names as the intrinsic visible invariant. Section 3 connects the quotient theory to the Donsker-Varadhan bridge from [7], establishes the visible algebraic object, and proves the quartic defect and sextic robustness theorems.
Sections 4-6 develop the internal structure of : hidden mediation and the conservation split, hidden locality and graph-local decay, and the Bell-square gluing frontier. Sections 7-9 evaluate the algebraic theory in nonequilibrium systems: symmetry at the symmetric point, fast-memory homogenisation with source law and obstruction, and corridor asymptotics with regime separation.
1.5 Notation and glossary
The upstairs space carries the full precision operator ; the downstairs space carries the visible precision . An observation is a surjective linear map . An observation tower is a chain of surjections ; the composition theorem says that observing once or in two steps gives the same visible precision.
The backbone is the time-symmetric part of the full precision. The irreversible correction is the contribution from detailed-balance-breaking currents. The conservation split is , where is the quotient-visible backbone.
We write for the cone of symmetric positive definite matrices, or for the quotient map, and for the Loewner partial order.
2 Quotient observation and the intrinsic visible object
For a positive precision operator and a surjective observation map , the visible operator is
| (2.1) |
This is the visible precision canonically induced by . It is the positive-definite shorted or Schur-complement construction associated with the observation map in the operator-theoretic sense of [13, 14, 15, 16, 17]. It is not chosen or assumed, instead forced by the observation problem itself: for each visible displacement, it records the least full-space energy needed to realise that displacement.
It has a variational meaning, it admits a clean differential calculus, it composes along towers of observation, and it differs in a controlled way from naive visible compression. Those facts identify as the visible invariant carried by quotient observation.
2.1 Setting and quotient observation on the positive cone
Fix a surjective linear map . For each visible displacement , consider the constrained quadratic energy
| (2.2) |
The positive cone is forced from the start: once the ambient precision is positive definite, the minimisation problem is strictly convex, the minimiser is unique, and the visible quadratic form is again positive definite. The quotient-visible precision is characterised by
| (2.3) |
So the visible operator is not an auxiliary construction, it is the quadratic form selected by the problem.
The same minimisation admits a matching dual formulation. The constrained primal energy upstairs and the dual visible energy downstairs agree, and that agreement is the algebra behind the quotient map. From it one obtains well posedness on , positive homogeneity, monotonicity in Loewner order, and concavity, in the standard positive-operator framework of [18, 19, 20, 21, 17]. One also obtains a canonical -horizontal chart, which separates genuine visible motion from gauge motion inside the hidden kernel and makes the later tangent calculus transparent.
Theorem 2.1 (Variational characterisation).
For every and every surjective , the quotient-visible precision is the unique operator in satisfying (2.3). Equivalently,
| (2.4) |
Corollary 2.2 (Primal-dual decomposition).
The visible energy admits matching primal and dual representations. In particular, the minimising lift and the maximising visible multiplier encode the same quadratic form.
In this language quotient precision is the minimum-energy visible form induced by the upstairs law, and it sits naturally in the shorted-operator and parallel-addition side of positive-operator theory [15, 14, 22, 23].
Theorem 2.3 (Basic positive-cone calculus).
The map is well posed on , positively homogeneous, monotone, and concave. Relative to a fixed base point , it admits a canonical horizontal chart adapted to quotient observation.
What has been gained already is decisive. Observation no longer looks like a loss of structure followed by arbitrary repair. It produces a definite positive operator with a canonical variational meaning.
2.2 Fréchet calculus and the tangent ceiling
Once the quotient map is fixed, its first-order calculus is immediate. For a symmetric perturbation , the derivative is the visible shadow of that perturbation transported through and returned by . The main point is not the formula itself, but what it bounds: positive perturbations upstairs induce a maximal first-order visible response, and later hidden-mediation effects can only sit beneath that ceiling.
Theorem 2.4 (Fréchet derivative).
The quotient map is Fréchet differentiable on . Its derivative at in direction is
| (2.5) |
Proposition 2.5 (Tangent ceiling).
If , then . More sharply, is the maximal first-order visible response compatible with the positive perturbation .
The tangent ceiling is infrastructure rather than endpoint. It identifies the maximal first-order visible response compatible with a given positive perturbation. Later hidden-mediation results will show that hidden structure redistributes or attenuates visible strength beneath this ceiling, but does not create a new visible direction from nothing.
2.3 Exact composition along observation towers
The decisive structural fact is composition. Suppose observation occurs in stages,
| (2.6) |
Then one may observe once or observe in two steps. The result is the same:
| (2.7) |
So quotient observation closes on itself. The visible object keeps its type under repeated elimination of hidden structure.
Theorem 2.6 (Composition law).
For surjective observation maps and with ,
| (2.8) |
This is what makes a renormalisation-natural object rather than an ad hoc one, in the precise sense that repeated elimination stays inside one visible variable rather than generating a new effective object at each stage [24, 25, 26]. No correction term is needed. No auxiliary state has to be remembered. Repeated observation stays inside the same category and returns the same kind of operator.
The tangent theory composes as well. The visible derivative shadow transports down an observation tower by coisometric compression. At the spectral level this yields monotone Ky Fan detectability envelopes: as observation becomes coarser, the visible singular spectrum can only contract [27, 28].
Theorem 2.7 (Tangent shadow transport).
Under tower composition, the derivative shadow of quotient observation transports by a coisometric map satisfying . Specifically, if and , the derivative at the coarser level factors through the derivative at the finer level via coisometric compression. In particular, the Ky Fan singular values of the visible derivative shadow contract monotonically along any observation tower.
With composition known, the role of changes. It is no longer merely a good definition. It is the object that survives observation in the only way a visible invariant should.
2.4 Compression versus quotient: the Schur gap
Quotient observation is not naive visible compression. Fix a visible-hidden splitting and write
| (2.9) |
Compression keeps the principal visible block . Quotient observation eliminates the hidden sector through the inverse and returns the Schur complement [29, 30, 31]
| (2.10) |
The difference is the Schur gap
| (2.11) |
So compression and quotient coincide only when the hidden sector does not feed back into the visible one.
Proposition 2.8 (Schur gap formula).
For every block decomposition adapted to a visible-hidden splitting, the difference between naive compression and quotient observation is the positive semidefinite Schur gap.
Remark (Scalar diagnostics).
In scalar visible rank, useful summaries include , , and the corresponding log-determinant defect. These are diagnostics of hidden contribution.
2.5 The intrinsic visible invariant
The story is now fixed and quotient observation produces a definite visible precision. That operator has a variational characterisation, a stable first-order calculus, a composition law along observation towers, and a precise distinction from naive compression. Those properties identify as the intrinsic visible invariant.
The Donsker-Varadhan Hessian has a different role. It is a bridge object upstairs, and it will matter in the next section because it leads to a finite visible algebraic descendant. But the object that closes under observation is , with the Donsker-Varadhan law surviving as its tangent ceiling. There is no canonical nontrivial ceiling determined by alone, hidden-load and determinant-clock variables become exact only after a ceiling or reference has been declared. By contrast, quotient precision is intrinsic to the observed pair itself. This is why the visible variable closes under observation towers, while ceiling-mediated hidden comparison adds further exact structure only after the ambient reference has been fixed.
That is the operator one can transport, compare, and compose without leaving the observation category. The paired-spectrum obstruction (§4) makes this precise: at fixed visible dimension, the Donsker-Varadhan Hessian generically does not close, and the quotient precision is the correct replacement.
A second structural theme begins here. Later results will show that, in scalar visible rank, the visible precision splits as
| (2.12) |
with the reversible backbone and the irreversible correction. The point here is only conceptual: is large enough to carry both contributions while remaining stable under observation.
3 The Donsker-Varadhan bridge and the visible algebraic object
The Donsker-Varadhan bridge from [7] produces a finite visible algebraic object, the tangent descendant of . The quartic and sextic defect theorems below measure how much structure survives the transition from tangent to full covariance level.
3.1 The bridge and its quotient reduction
Section 3 of [7] proved the exact quadratic Donsker-Varadhan bridge
| (3.1) |
where is the time-symmetric backbone precision and is the skew current operator. We read the output of this bridge through quotient observation.
Introduce a perturbation parameter by , so that
| (3.2) |
In particular,
| (3.3) |
Definition 3.1 (-adapted quotient sector).
A decomposition is called -adapted if
| (3.4) |
in the associated block coordinates.
The algebraic cascade from bridge to visible object proceeds in three steps:
| (3.5) |
Remark (Source, propagator, field structure).
The bridge (3.1) has a physical reading. The current operator is the source, the resolvent is the propagator, and the product is the induced field correction. The visible algebraic object is the gauge-invariant visible projection of this chain.
3.2 The visible algebraic object
Write the finite reduced block precision as
| (3.6) |
where the first coordinate is the visible direction and the remaining coordinates are hidden reduced directions.
Theorem 3.2 (Visible algebraic object).
The visible algebraic descendant of the bridge output is the Schur complement
| (3.7) |
The Donsker-Varadhan correction is quadratic in the skew channel, and quotient elimination of the hidden reduced directions turns the bridge output into a visible Schur complement. By the composition theorem (Theorem 2.6), is a tangent descendant of the intrinsic visible precision .
3.3 Scalar visible Schur identity and completion-independence package
In scalar visible rank (), the Schur complement reduces to a generator-level identity that does not require explicit diagonalisation of the full precision. The visible precision is a rational function of the generator entries, computable from the stationary distribution and transition rates without spectral decomposition.
Theorem 3.3 (Completion independence at ).
At the matched visible-law level, the quotient-visible precision does not depend on the hidden completion. Two hidden completions that produce the same visible law yield the same visible precision.
The completion-independence hierarchy:
-
•
Exact for (proved).
-
•
Verified numerically for tested ladder families at .
-
•
Open for general and general graph topologies.
3.4 Intrinsic quartic shadow defect and sextic divergence robustness
The quartic order is where quotient observation first departs from the tangent law.
Theorem 3.4 (Signed quartic bridge).
Assume the Donsker-Varadhan expansion (3.1) with bookkeeping (3.2), and let be -adapted. Write for the block of from (3.3). Then:
-
1.
compression recovers the finite-observation visible quadratic law on ;
-
2.
quotient and compression agree through order ;
-
3.
the first genuinely new quotient effect is quartic and sign-definite:
(3.8)
Proof.
Corollary 3.5 (Tangent closure of visible Donsker-Varadhan geometry).
In the -adapted setting,
| (3.9) |
The finite-observation visible law is the quadratic tangent law of quotient observation in the Donsker-Varadhan sector.
The signed quartic bridge identifies where quotient observation departs from compression. At the algebraic level it is a square-completion defect with definite sign, in the same broad spirit as energy-splitting identities familiar from other positive-definite variational settings [32]. The next theorem shows that this departure is intrinsic to the quotient geometry.
Theorem 3.6 (Intrinsic quartic shadow defect and sextic divergence robustness).
Fix a surjection and a backbone . Let
| (3.10) |
and set . Define the tangent visible correction
| (3.11) |
the visible shadow
| (3.12) |
and the tangent shadow
| (3.13) |
Then:
-
1.
the quotient-visible expansion has the intrinsic form
(3.14) where
(3.15) -
2.
the visible shadow loses first at quartic order,
(3.16) -
3.
for every smooth spectral functional on symmetric matrices with and ,
(3.17) In particular, reverse Gaussian KL, forward Gaussian KL, and squared Hellinger first lose only at sextic order.
Proof.
3.5 What the bridge still contributes conceptually
Remark (Computation versus interpretation).
In the scalar visible case (), the bridge may be algebraically bypassed: the visible precision can be computed directly from the generator. The bridge nonetheless matters as the systematic path from the Donsker-Varadhan Hessian to the quotient-visible precision. The distinction is between computation (which the scalar case streamlines) and interpretation (which the bridge provides at any rank).
3.6 Boundaries of the scalar simplification
The scalar simplification of §3.3 does not extend to general visible rank. When , the visible precision is a matrix whose internal structure (eigenvalues, eigenvectors, parametric dependence) is not determined by scalar diagnostics.
Visible-law encoding of is -specific: one can read from the visible switching rates. For general , the visible law constrains but does not determine . What additional structure is needed at higher rank remains open.
The algebraic theory (§2) and the bridge connection are in hand. The next sections develop the internal structure of : hidden mediation, conservation, locality, and the gluing frontier.
4 Hidden mediation, scalar clocks, and sequential transport
Section 3 identified the visible algebraic object. The next question is internal: what hidden mechanism produces a visible law beneath the tangent ceiling, how does that mechanism compose, and which scalar quantity measures its cumulative action? The answer is hidden mediation. Beneath a fixed tangent ceiling, every support-preserving visible law is classified by a positive hidden load, sequential composition transports that load by a rigid conjugation law, and the only continuous orthogonally invariant additive clock on the interior is the determinant clock. The section closes by isolating the obstruction that prevents same-dimension Donsker-Varadhan closure from being the correct observable class.
4.1 Exact latent-contraction formula and the tangent ceiling
Work in an -adapted quotient chart and whiten by the backbone so that the upstairs precision takes the form
| (4.1) |
where contains the visible rows and the hidden rows. In this representation the tangent ceiling is explicit: quotient observation keeps the same visible support ceiling as compression, but contracts beneath it by a positive hidden contribution. At the level of Gaussian graphical models this is hidden-variable precision geometry, not a heuristic latent-variable ansatz [33, 34, 35].
Theorem 4.1 (Exact latent-contraction formula).
In the setting (4.1), the visible quotient correction is
| (4.2) |
The tangent ceiling is
| (4.3) |
and the gap is
| (4.4) |
Equivalently,
| (4.5) |
Proof.
Corollary 4.2 (Exact support theorem).
For every finite hidden sector,
| (4.6) |
Thus finite hidden mediation preserves the visible correction support. In particular, the hidden sector attenuates inside the existing visible support rather than creating new visible directions, which is also the natural completion geometry for latent Gaussian models [36, 35].
Proof.
Since on the latent space, and have the same range and rank. ∎
Remark (Blind directions remain blind).
Corollary 4.2 is the support rigidity statement in ordinary language. If a visible direction receives no signal from the tangent ceiling , then no finite hidden architecture can make that direction informative later, because the actual visible correction has the same support. Hidden complexity can attenuate or redistribute strength inside the tangent support, but it cannot create a new visible direction from nothing.
4.2 Support-preserving visible cone, its closure, and hidden-load parametrisation
The latent-contraction formula says that hidden mediation acts by attenuation inside the support of the tangent ceiling. The next result identifies the full image of that action.
Proposition 4.3 (Support-preserving interval and closure theorem).
Let and let . A matrix arises from a finite hidden sector if and only if
| (4.7) |
Taking closure adds the boundary on . Equivalently, the closure of the visible image is the Loewner interval beneath , whose interior is support-preserving.
Proof.
From Theorem 4.1,
By polar decomposition, for a partial isometry with initial space the latent support of and final space . Therefore
so (4.7) holds with . Since and , one has on .
Conversely, let on . Choose the latent space to be , set , and define . Since and , the matrix is positive semidefinite. Pick with . Then , so . The boundary case follows by limit. ∎
Exact visible class and its closure. With ,
Here . Thus finite hidden sectors realise the support-preserving interior , while taking closure adds the boundary . The hidden-load coordinate of Theorem 4.4 is defined on , and the next results identify its rank and determinant invariants.
Theorem 4.4 (Intrinsic hidden-load parametrisation).
Let and let . A visible law in the support-preserving interior beneath is equivalently an operator of the form
For such , define the intrinsic hidden-load operator on by
| (4.8) |
Then on , and
| (4.9) |
Conversely, every on determines a visible law by (4.9). Hence the support-preserving visible interior beneath is in bijection with the positive cone on .
Proof.
Conversely, if on , then satisfies
so Proposition 4.3 yields a visible realisation
This proves the bijection. ∎
Corollary 4.5 (Hidden-load monotonicity).
Let
for . Then
| (4.10) |
Thus increasing hidden load can only attenuate the visible correction.
Proof.
Restrict to , where . Congruence by gives
Since inversion reverses Loewner order on positive definite operators,
which is (4.10). ∎
Remark (One positive-cone geometry seen from two sides).
The quotient programme now contains two positive-cone geometries. First, the global quotient map
is monotone and concave on the upstairs positive cone. Second, beneath a fixed tangent ceiling on the active support , every support-preserving visible law in the interior has the form
The first is the global quotient-side cone, the second is the intrinsic hidden-load cone after the ceiling has been fixed. They are the global and support-adapted faces of the same attenuation geometry.
Theorem 4.6 (Minimal hidden latent dimension).
Let with on . Then the minimal hidden latent dimension needed to realise is
| (4.11) |
Proof.
By Theorem 4.4, write
Any realisation requires a Gram factorisation , so the hidden latent dimension must be at least . Choosing a Gram factorisation of shows that hidden dimensions suffice. Since
and has the same rank as , we obtain
This proves the claim. ∎
Corollary 4.7 (Rank and volume of hidden load).
Proof.
Remark (Operator-interval picture).
Beneath a fixed tangent ceiling , finite hidden sectors realise the support-preserving interior
and taking closure adds the boundary on . On the interior, the hidden-load coordinate turns the support-preserving class into the positive cone on the active support. The scalar quantity
measures latent contraction volume. Same-dimension skew-square closure will appear below as a special paired-spectrum slice inside this larger cone.
4.3 Sequential composition, hidden-load transport, and scalar clocks
All statements in this subsection are made on one fixed active support stratum . No claim is made here about a finite additive scalar clock across genuine rank-loss events.
Remark.
The coupled field layer leaves the transport algebra of this subsection unchanged on support-stable strata. What changes there is only the infinitesimal generator: the one-step increment becomes with
so the present hidden-load transport law applies stratumwise in the coupled regime as well.
Proposition 4.8 (Support-preserving sequential effect law).
Let
For define
| (4.14) |
Then .
Proof.
Since , congruence by preserves positivity and gives . Also,
Hence . ∎
Remark (The visible law is not the associative object).
The visible product is not associative in general. The true associative object is the underlying contraction composition downstairs. The visible interval is the Gram-shadow image of that contraction composition.
Theorem 4.9 (Exact hidden-load transport law).
Let
Then
| (4.15) |
with
| (4.16) |
Proof.
Corollary 4.10 (Survivor transport law).
Define the survivor complement
Then
| (4.17) |
Proof.
Use
∎
The transport law isolates the correct associative structure, and the scalar clock theorem identifies the only continuous additive quantity compatible with it.
Corollary 4.11 (Additive determinant clock and barrier identity).
Define
| (4.18) |
on . Then
| (4.19) |
In hidden-load coordinates,
| (4.20) |
If the unwhitened visible law is
then on the active support,
| (4.21) |
Proof.
Theorem 4.12 (Uniqueness of the additive interior clock).
Let be continuous, orthogonally invariant, and additive under :
Then there exists such that
| (4.22) |
for all .
Proof.
By orthogonal invariance, it suffices to evaluate on diagonal effects. For diagonal matrices,
with each . Hence continuity and additivity under coordinatewise multiplication imply
for some constant . Orthogonal invariance extends this to all . ∎
Corollary 4.13 (No finite continuous additive clock on the closed interval).
Let be continuous, orthogonally invariant, additive under , and satisfy . Then
Proof.
Restrict to the interior . By Theorem 4.12,
there. Consider
If , then , contradicting finite continuity on . Thus , hence . ∎
Corollary 4.14 (Extended-real completion of the clock).
Define
Then is additive under in the extended-real sense.
Proof.
Interior additivity is Corollary 4.11. If either factor is singular, then is singular, so is stable under composition. ∎
Proposition 4.15 (Scalar mediation invariants).
Let
If are the eigenvalues of , then the eigenvalues of are
Hence
| (4.23) |
| (4.24) |
and
| (4.25) |
Thus trace, operator norm, and log-determinant provide complementary scalar diagnostics of total, peak, and volumetric hidden mediation.
Proof.
Since is a spectral function of , the operators , , and commute and are simultaneously diagonalisable. On each eigenvector of with eigenvalue , the corresponding eigenvalue of is . The displayed trace, norm, and log-determinant formulas follow immediately. ∎
Proposition 4.16 (Exact superadditive ceiling-KL identities).
Let
and write
Then
| (4.26) |
and, with
one also has
| (4.27) |
In particular, both Gaussian KL directions relative to the ceiling are superadditive under support-preserving sequential quotienting.
Proof.
Remark (Hidden-load interaction measure).
The cross-term in (4.26) is not bookkeeping noise. It is the interaction measure for sequential hidden mediations. It vanishes only when the two mediations are orthogonal in hidden-load space, and otherwise quantifies how much the second mediation is transported by the first before the visible law is read out.
4.4 Conservation split:
The determinant clock identifies the only additive scalar content of sequential mediation. The next statement isolates the additive operator content of the visible precision itself.
Theorem 4.17 (Conservation split).
Fix a completion and write
| (4.28) |
where is the reversible backbone and is the algebraic precision carrying the full visible response. Then
| (4.29) |
In scalar visible rank, and more generally on every class of completions for which is known to be completion-independent, the completion-dependent variations of and compensate so that the total visible precision remains fixed.
Proof.
The identity (4.29) is the definition of rewritten. The nontrivial statement is the compensation claim. In scalar visible rank this follows from the completion-independence package of Section 3.3: when two completions produce the same visible law, they produce the same , hence any change in must be cancelled by the opposite change in . The same implication holds on any broader class of completions for which completion-independence of has been established. ∎
Remark (Ward-identity reading).
The split (4.29) has the structure of a Ward identity. The total visible precision is the invariant object, while and depend on the chosen completion but are locked in sum. The paper does not need gauge language for the mathematics, but it is the right interpretation of the compensation mechanism.
Remark (Reversible and irreversible sectors).
In the Donsker-Varadhan bridge, is the visible contribution of the time-symmetric backbone and is the visible increment carried by the quadratic skew correction . The split therefore separates the reversible backbone from the irreversible correction at the level of the intrinsic visible object. It is this separation, not the fixed-dimension Hessian itself, that survives quotient observation.
4.5 Same-dimension closure criterion and its failure boundary
The hidden-load cone is the class closed by quotient elimination. The same observed-dimension Donsker-Varadhan skew-square class is smaller, and its failure boundary is sharp.
Proposition 4.18 (Paired-spectrum criterion).
Let and let be a visible correction. Set
| (4.30) |
There exists a visible skew matrix of the same observed dimension such that
if and only if the positive spectrum of is pairwise degenerate. In particular, odd visible correction rank is impossible for same-dimension skew-square closure.
This is the same real skew-symmetric pairing obstruction that underlies Williamson-type normal forms and the canonical even-multiplicity structure of skew squares [37, 38].
Proof.
If such exists, define
Then is real skew-symmetric and
The nonzero singular values of a real skew matrix come in equal pairs, hence the positive eigenvalues of do as well.
Conversely, if the positive spectrum of is pairwise degenerate, choose an orthogonal basis in which
Let
where . Then is real skew-symmetric and . Setting
gives the required representation. ∎
Corollary 4.19 (Paired-spectrum defect as exact distance).
Let be as in (4.30), with ordered eigenvalues
Write and define
Let
| (4.31) |
where is an orthogonal spectral decomposition. Then belongs to the same observed-dimension skew-square slice from Proposition 4.18, and it is the unique Frobenius-nearest point in that slice. Equivalently,
| (4.32) |
Moreover,
| (4.33) |
In particular, the defect vanishes if and only if same observed-dimension skew-square closure holds.
Proof.
By Proposition 4.18, the target class consists of matrices of the form with , equivalently positive semidefinite matrices whose positive eigenvalues occur in equal adjacent pairs, with one forced zero when is odd. Fix such a target matrix . For fixed eigenvalues of , the Frobenius distance
is minimised when and commute, by the symmetric form of von Neumann’s trace inequality. Hence the nearest point may be taken in the eigenbasis of , and the matrix problem reduces to Euclidean projection of onto the cone of vectors with equal adjacent pairs and final zero when is odd.
The orthogonal projection onto that linear constraint set is obtained by averaging each adjacent pair, which gives (4.31). Because the eigenvalues are ordered, these pair averages remain ordered and nonnegative, so the projected vector already lies in the admissible cone. This proves (4.32). Expanding the squared norm pair by pair gives
and when is odd the final coordinate is projected to zero, contributing . This yields (4.33). The final claim is immediate from Proposition 4.18.∎
Remark (Robust empirical certificate).
Define the paired-spectrum defect by
Distance to a closed set is -Lipschitz in Frobenius norm, so for any estimate one has
Hence any certified lower bound on beyond estimation error is a robust witness that the visible correction does not lie in the same observed-dimension skew-square class. The defect is therefore the quantitative version of the binary obstruction in Proposition 4.18.
Remark (What is and is not closed).
Theorems 4.1 and 4.4, together with Proposition 4.18, show the correct closure picture. Exact quotienting preserves Gaussian precision geometry and the support-preserving attenuation class beneath a fixed tangent ceiling. It does not generically preserve the same observed-dimension Donsker-Varadhan skew-square class. The microscopic Donsker-Varadhan Hessian should therefore be regarded as the tangent ceiling and microscopic cone inside the larger quotient-visible class, not as the class closed by Schur elimination itself.
5 Hidden locality and graph-local structure
Section 4 showed that the quotient-visible object is produced by hidden mediation beneath a fixed tangent ceiling. The next question is spatial: if the upstairs precision is graph-local on the hidden sector, does the induced visible law respect that locality, or can Schur elimination generate arbitrary long-range coupling? The answer is no. Visible fill-in is organised by hidden connected components and is exponentially suppressed by hidden graph distance, with a universal rate determined by the hidden spectral window. The section closes by identifying corridor extremisers for this long-range transfer problem. Those extremisers belong to the abstract positive-cone locality theory developed here. Section 9 later studies a Markov corridor regime in the hidden-feedback ladder; it is inspired by the same geometry but is not the same statement.
5.1 Componentwise hidden mediation
Let and let
| (5.1) |
be a graph-local precision operator. In this Gaussian graphical-model setting, precision sparsity encodes conditional independence and Schur elimination creates visible fill-in [33, 34, 39]. The point is that this fill-in is not arbitrary. It is first split by hidden connected component, and only then can one ask how large the resulting visible coupling can be.
Theorem 5.1 (Hidden-component mediation).
The visible effective precision after hidden elimination is
| (5.2) |
If the hidden graph decomposes into connected components respected by , then
| (5.3) |
Consequently a visible pair can acquire a new coupling only if both visible coordinates connect to the same hidden component.
The decomposition in (5.3) is the Green-kernel or walk-sum mediation picture for hidden elimination [40, 41]. It is the componentwise version of the hidden-mediation mechanism from Section 4: locality is not lost at the level of support, even though fill-in becomes dense inside the mediated visible block.
Proof.
Equation (5.2) is the Schur complement formula. If the hidden graph splits into connected components respected by , then after permuting indices one has
so the inverse is block diagonal with the same decomposition. Substituting this into the Schur term yields (5.3). The last claim is immediate from the support structure of the sum. ∎
5.2 Intrinsic graph-local decay
Componentwise mediation is only the first locality statement. The sharper question is quantitative: once two visible channels are forced to communicate through a distant hidden region, how strongly can they couple? The next theorem gives the universal answer. It extends classical decay-of-inverse results for sparse positive matrices to the hidden-mediation setting relevant for quotient observation [42, 43, 44].
Proposition 5.2 (Graph-distance decay via polynomial approximation).
Let be a hidden precision matrix supported on a hidden graph , and suppose
Let be hidden vertex sets with graph distance at least , and define
| (5.4) |
Then
| (5.5) |
Moreover, classical Chebyshev approximation yields constants and
for which
| (5.6) |
Proof.
Corollary 5.3 (Visible coupling decay).
Let be visible-to-hidden coupling vectors supported on hidden sets at graph distance at least . Then
| (5.7) |
Proof.
Apply Proposition 5.2 and Cauchy-Schwarz. ∎
Remark (Locality as a visible prediction).
Corollary 5.3 is the headline locality statement of the programme-core theory. Once the hidden spectral window is controlled, long-range visible coupling is exponentially suppressed by hidden graph distance. This is a prediction about the visible object, not merely a structural statement about the upstairs operator.
5.3 Corridor extremisers and bundle structure
The Chebyshev bound gives a universal decay rate. The next theorem identifies the asymptotic graph shape that realises that rate. This is still an abstract statement about graph-local hidden precision geometry. The strong-driving corridor analysis in Section 9 concerns a specific hidden-feedback ladder and should not be conflated with the present extremiser theorem.
Proposition 5.4 (Corridor realisation of the universal exponential rate).
Let be the path on hidden vertices and define the constant-coefficient corridor precision
| (5.8) |
Then , the endpoint distance is , and the endpoint transfer obeys
| (5.9) |
for an explicit positive constant and the same decay rate as in Proposition 5.2. Consequently the one-dimensional corridor realises the universal exponential decay rate at the level of the exponent.
Proof.
The spectral inclusion for (5.8) follows from the path adjacency spectrum. The inverse of a constant-coefficient Jacobi chain is explicit, and its endpoint entry has the stated asymptotic form (5.9). Proposition 5.2 shows that no graph-local hidden precision with spectral window can decay more slowly than exponentially at rate . Hence the corridor family realises the universal exponent. ∎
Remark (Rate optimality versus extremiser questions).
Proposition 5.4 is a rate-level statement. It identifies the exponential decay exponent and a corridor family that realises it. It does not prove a sharp finite- minimax constant, and it does not prove the stronger many-channel threshold-count extremiser statement. Those questions remain open in the abstract locality problem. The corridor regime in Section 9 should therefore be read as a separate dynamical investigation built on the same rate-level geometry, not as a proof of full finite-distance optimality.
5.4 Scope of the current locality theory
The locality theory proved here has two parts. First, hidden mediation splits by connected component. Second, once the hidden spectral window is fixed, off-mask visible coupling is exponentially suppressed with graph distance, and the corridor family realises the universal decay exponent asymptotically. What is not proved here is a sharp finite-distance minimax constant or a full classification of graph extremisers beyond the corridor bundle. Adjacency-loss diagnostics and fill-in summaries are deferred to Appendix C.
6 Bell and temporal frontiers as law-level evidence
Sections 4 and 5 developed the internal geometry of : hidden mediation, transport, conservation, and graph-local structure. The next question is evidential. Does the quotient-visible viewpoint detect genuine law-level structure that simpler summaries erase? On the Bell square the answer is yes. The visible datum is not merely a correlator table. It is a family of visible pair laws, and the right compatibility question is whether those pair laws arise as quotient marginals of one common visible Gaussian law. On that square the resulting frontier has two independent coordinates: variance consistency and the arcsine CHSH obstruction. Correlator-only summaries retain only the second.
6.1 Common visible gluing as a law-level compatibility problem
The Bell square is the first nontrivial test of the programme-core viewpoint because it asks for compatibility of several visible quotient outputs at once. The question is not whether each pair law is individually admissible. It is whether the four pair laws can be realised simultaneously as quotient marginals of one common law upstairs on the visible variables. That is the kind of compatibility problem the quotient-visible formalism is designed to express.
Definition 6.1 (Common Schur gluing of context families).
Let
be four visible pair precisions, and let
select the coordinate pair from . We say that the family is commonly Schur-glued if there exists such that
| (6.1) |
Definition 6.1 is the Bell-square instance of quotient compatibility. It asks whether four visible pair laws sit on one common point of the positive cone after quotienting by the four coordinate projections. The next theorem shows that, on the Bell square, this compatibility problem collapses to two law-level conditions.
Theorem 6.2 (Bell-square collapse theorem).
Let
and define
| (6.2) |
Then the following are equivalent.
-
1.
There exists a centred Gaussian law on whose marginals are exactly the pair laws with covariances . In the positive definite case this is equivalent to common Schur gluing in the sense of Definition 6.1.
-
2.
The family satisfies remote-setting variance consistency,
(6.3) and the four arcsine CHSH inequalities
(6.4) (6.5) (6.6) (6.7) Equivalently, with
(6.8) common gluing is equivalent to variance consistency together with Bell-locality of the lifted correlator table .
Proof.
Appendix A isolates the Gaussian gluing criterion and then specialises the Bell square using the standard arcsine lift. The new point for the present paper is structural: the quotient-visible compatibility problem is not exhausted by correlators. On the Bell square the full visible law contributes the diagonal variance-gluing constraints (6.3) and the lifted CHSH constraints (6.4)-(6.7). ∎
The theorem should be read as support for the programme-core theory, not as an isolated Bell observation. Sections 2-4 say that visible objects must be compared at law level, because quotient observation lives on the positive cone and composes by Schur transport. The Bell square tests that claim in the first genuinely constrained multi-context setting. The answer is rigid: the compatibility frontier is two-coordinate from the outset.
6.2 Bell-square frontier and strict refinement beyond Bell-locality
The Bell-local shadow detects only one part of the frontier from Theorem 6.2. The variance sector is a distinct obstruction, and it is invisible to correlator-only summaries.
Proposition 6.3 (Strict refinement over Bell-locality).
Bell-locality of the lifted correlator table is necessary but not sufficient for common visible Gaussian gluing of the full pair laws.
Proof.
Remark (Two Bell-square obstructions).
For a Bell-square family, define
| (6.9) |
and let be the excess of the largest left-hand side of (6.4)-(6.7) above , truncated below at zero. Then common gluing on the Bell square is equivalent to the simultaneous vanishing of both obstructions,
This packages the Bell-square frontier as a two-coordinate compatibility problem: one coordinate is invisible to Bell correlators, while the other is the usual arcsine CHSH obstruction.
Corollary 6.4 (Bell cube normal form).
Let be the matrix whose rows are the four CHSH sign vectors
and define lifted Bell coordinates
Then the Bell-compatible region in arcsine coordinates is exactly the cube
Equivalently, the four CHSH inequalities are the coordinate inequalities of one global hypercubic normal form. In particular, Euclidean nearest-point repair in is coordinatewise clipping, and the Bell support function is
Appendix A records the derivation and the exact repair formulas.
Corollary 6.5 (Single-readout CHSH locality).
Suppose a Bell-context family is commonly Schur-glued, and let
for some satisfying (6.1). Let
Then the correlators
obey the CHSH bound
| (6.10) |
and likewise for the other three sign choices with one minus sign.
Proof.
All four outputs are measurable functions of the single common random vector . Hence for every realisation one has
because and . Taking expectations gives (6.10), and the other sign choices follow by relabelling. ∎
6.3 Why the quotient-visible perspective sees more than correlators
The Bell-facing conclusion is now sharper than a CHSH guardrail. Common visible Gaussian gluing on the Bell square is a law-level compatibility problem. Bell correlators detect only the arcsine shadow of that problem, whereas the quotient-visible formalism keeps the full pair law and therefore keeps the variance sector as well. Proposition 6.3 proves that this extra sector is not cosmetic. Two families can have identical Bell-local correlator shadow and still differ on the existence of a common quotient-visible law.
This is the kind of evidence the paper needs at this stage. Theorem 6.2 does not merely add another reformulation of Bell-locality. It shows that the intrinsic visible variable from Section 2 resolves frontier structure that correlator compression destroys. The Bell square is therefore a genuine law-level stress test for . The passage from pair laws to correlators is a further readout layer, and it loses one of the two compatibility coordinates. The quotient-visible perspective sees more because it works before that readout collapse.
Corollary 6.5 then recovers the operational statement inside the fuller law-level picture. Once common gluing exists, every single bounded local readout sits under the classical CHSH bound. The usual guardrail is therefore recovered as a downstream shadow of common visible gluing, not as the primary object.
6.4 Temporal frontier
The same compatibility question can be asked on an observation graph of times rather than Bell settings. One specifies visible pair laws on the edges of a time-indexed graph and asks whether they admit one common Gaussian law whose edge marginals realise the prescribed family. Trees have only repeated-marginal consistency, whereas the first genuinely temporal clique already introduces a nontrivial law-level obstruction. Appendix A records the first fully observed temporal case and its sign-shadow interpretation. We do not develop a full temporal theory in the main text. The point here is only structural: Bell and temporal frontiers are two graph-indexed instances of one quotient-visible gluing problem.
7 Exact symmetry and the hidden response carrier
We now turn from the abstract quotient-visible theory to the controlled hidden-feedback ladder family. The visible variable is the activity , the hidden variable is the memory level , and the observer sees only the activity projection. The question is the first one worth asking once the abstract theory is in place: does the intrinsic visible object ever close in a completely rigid way inside a genuine nonequilibrium model? At and the answer is yes. A discrete symmetry forces an exact eigenmode, the visible line becomes an exact eigenline of the reduced conjugated operator, and the scalar visible algebra collapses to one parameter.
7.1 The exact eigenmode at
Write the ladder generator in the split form
| (7.1) |
where changes activity and changes memory only. At and the visible flip rates are symmetric, so the lumped visible chain has rates . Define the activity sign vector
| (7.2) |
This vector is constant along each memory fibre and records only the visible activity parity.
Theorem 7.1 (Exact symmetry at the symmetric point).
Consider the hidden-feedback ladder at and , with scalar visible observation given by activity. Then the following statements hold exactly for every finite and every finite .
-
(i)
The activity sign vector satisfies
(7.3) -
(ii)
In the visible-first reduced tangent basis, the visible line is an exact right eigenline of the reduced conjugated generator with eigenvalue .
-
(iii)
The quotient-visible algebraic precision satisfies
(7.4) -
(iv)
Writing for the reversible visible backbone, for the irreversible correction, and for the scalar tangent load on the visible line, one has
(7.5)
Proof.
Memory moves preserve activity and therefore preserve the sign vector, so . At and , every visible flip changes the sign and occurs at rate , hence . Multiplying by the prefactor in (7.1) gives (7.3). The reduction to the visible-first tangent basis preserves the visible line generated by the activity mode, so the induced reduced operator has the same visible eigenvalue. In scalar visible rank, the generator-level Schur identity from Section 3.3 identifies with the visible Schur complement of . Because the visible line is exact and carries eigenvalue , that Schur complement equals , which gives (7.4). The identities in (7.5) are then the scalar Schur relations for the decomposition of the reduced conjugated operator into reversible backbone plus skew correction. ∎
The theorem is the centre of Part III. Nothing asymptotic has happened yet. The visible clock is already pinned to a constant, and the remaining freedom is only in how that fixed total precision is split between reversible and irreversible sectors.
Corollary 7.2 (Single-parameter reduction and frozen clock).
On the slice and , the scalar visible algebra is determined by the single parameter . More precisely,
| (7.6) |
Consequently is frozen across all and , while decreases and increases monotonically as functions of .
Proof.
Remark (Trading segment and corridor endpoint).
Remark (Why the eigenmode exists).
The mechanism behind Theorem 7.1 is a activity-exchange symmetry. At and , exchanging the two activity classes leaves the generator invariant and makes the sign representation one-dimensional. The mode is therefore forced, not guessed. This is also the reason the phenomenon transfers to any binary-visible model whose generator has the same activity-exchange symmetry.
7.2 The visible-first Schur reduction
The previous theorem identifies the correct visible line. Once that line is fixed, the correct reduced basis is forced: first the true visible tangent vector, then an orthonormal basis of its hidden complement. The point is structural, not cosmetic. The first-correction analysis lives in this basis because only in this basis does the visible eigenline become a block constraint.
Let denote the reduced conjugated tangent operator in a visible-first orthonormal basis, and write its block form as
| (7.7) |
where the first coordinate is the visible line and the remaining coordinates form the hidden complement.
Proposition 7.3 (Visible-first Schur reduction at ).
For arbitrary field , provided , the visible line is the exact tangent line of the lumped two-state visible chain and is an exact right eigenline of the reduced conjugated generator. Equivalently,
| (7.8) |
In particular, the lower-left block vanishes exactly, so all hidden-to-visible correction passes through the single Schur channel determined by , , and the derivative of the lower-left block.
Proof.
Exact lumpability at identifies the true visible tangent direction with the activity mode of the two-state visible chain. Writing the reduced conjugated operator in a basis whose first vector spans that line, the eigenline condition means exactly that the image of the first basis vector has no hidden-complement component. This is equivalent to , which yields the block upper-triangular form (7.8). The visible scalar block is the negative total visible escape rate of the lumped chain, namely . ∎
Proposition 7.3 is the basis theorem for the correction layer. It explains why the naive odd-pair basis is not the right global coordinate system for the fast-memory expansion. The visible object responds through the true visible tangent line, not through an arbitrary parity chart. Section 8 uses this exact block form as the starting point for the first-correction expansion.
7.3 The canonical hidden response carrier
Once the visible-first block form is exact, the first hidden derivative that can influence the visible Schur coefficient is forced. There is only one scalar contraction left.
Theorem 7.4 (Canonical hidden response carrier).
Assume and write the visible-first reduced operator as in (7.7), with as in Proposition 7.3. Then the odd hidden contribution to the first derivative of the scalar visible Schur coefficient is carried by the single scalar
| (7.9) |
Equivalently, all competing hidden derivative channels are killed by the exact upper-triangular reduction at .
Moreover, once the visible line is fixed, is invariant under arbitrary orthogonal changes of hidden complement. Thus is canonical inside the visible-first Schur setting.
Proof.
For scalar visible rank, the visible Schur coefficient of (7.7) is
| (7.10) |
Differentiating at and using gives
| (7.11) |
Every term involving , , or derivatives of the inverse multiplied by vanishes. The only hidden contraction that survives is therefore . The normalization in (7.9) is the one natural for the ladder scaling. For canonicality, let be an orthogonal change of basis on the hidden complement. Then
so the scalar contraction is unchanged:
This proves both claims. ∎
Remark (Meaning of canonical).
The word “canonical” is used here in a precise and limited sense. The scalar is not a basis-free universal observable on every reduced model. It is canonical once the visible line has been fixed and the reduction is written in the visible-first Schur basis forced by Proposition 7.3. Inside that setting there is exactly one hidden derivative contraction, and it is invariant under all residual orthogonal freedom.
7.4 What this does and does not solve
Section 7 solves the exact algebraic centre of the correction analysis at . It identifies the correct reduction basis, proves that the visible precision freezes to on the symmetric slice, and collapses the scalar visible algebra to the single function . What it does not solve is equally important. It does not show that the eigenmode or the identity survive when or , it does not determine the fast-memory obstruction, and it does not explain the corridor regime. Those are the jobs of Sections 8 and 9. The mechanistic Woodbury termination behind the multiplicative identity remains open even though the algebraic identity itself is proved. Finally, the canonical carrier identified here is shown in Section 8 to be the unique survivor among the plausible first-correction reduction routes.
8 Fast-memory response and thermodynamic constraints
The exact carrier from Section 7 answers the symmetry question at the algebraic centre. The next question is asymptotic. When hidden memory equilibrates much faster than the visible activity flips, what visible law survives, and how does hidden nonequilibrium re-enter at the first nontrivial order? The answer has two parts. First, the visible law homogenises to a two-state chain, so the leading visible precision is completely explicit. Second, the first correction already remembers hidden geometry through one Schur channel, and that channel comes with both a source law and a sharp list of failures of the obvious simplifications.
8.1 Fast-memory homogenisation
Write for the visible flip rate out of activity at memory level , and let denote the stationary law of the pure memory dynamics on the fibre with activity fixed to . The corresponding homogenised visible exit rates are
| (8.1) |
These are the rates seen after the memory sector has fully mixed before the next visible jump.
Proposition 8.1 (Fast-memory homogenisation).
Fix finite and fixed parameters . As , the visible activity process homogenises to a two-state continuous-time Markov chain with rates and from (8.1). In particular, the leading visible dwell law is exponential in each activity sector.
Proof.
This is the standard fast-memory timescale-separation mechanism, used here as a verified asymptotic input rather than as a standalone homogenisation proof. At timescale the memory generator relaxes inside each activity fibre before a visible flip typically occurs. The visible jump hazard therefore averages against the fibre equilibrium , which yields the effective exit rates . Once those rates are fixed, the homogenised visible law is the two-state chain with generator
The exponential visible dwell law is then immediate. ∎
The first point of contact with the quotient-visible theory is that the homogenised limit is already scalar-visible, so the visible precision can be read off directly.
Corollary 8.2 (Homogenised visible precision).
For the homogenised two-state chain from Proposition 8.1,
| (8.2) |
Moreover, along the ladder family,
| (8.3) |
Thus the irreversible contribution is subleading in the fast-memory limit.
Proof.
For a two-state visible chain with rates and , the scalar visible Schur computation gives . Applying this to proves (8.2). The convergence statement is the visible consequence of Proposition 8.1: once the visible law converges to the homogenised two-state chain, the scalar visible precision converges to its exact two-state value, while the hidden irreversible correction disappears at leading order. ∎
8.2 First-correction structure
The homogenised limit is too coarse to explain how hidden nonequilibrium first re-enters the visible precision. That information appears one order later. The visible-first basis from Section 7 is the right coordinate system because it separates scalar visible drift from hidden-mediated feedback before any asymptotic truncation is taken.
The first object that enters is the correct entry law for a visible dwell. If the process is about to enter activity , it does not enter according to the within-activity equilibrium . It enters according to jump-weighted mass coming from the opposite activity.
Proposition 8.3 (Leading fast-memory entry law).
Define
| (8.4) |
Then is the leading fast-memory entry law for dwells in activity in the fast-memory asymptotic regime. In particular, the exact entry law differs from by , and at fixed the law is independent of the uniform field .
Proof.
A dwell in activity begins with a jump from the opposite activity, so the entering memory distribution is weighted by the source equilibrium multiplied by the jump hazard into . Normalisation by the total inflow rate gives (8.4). The correction is the usual first transient defect before complete fibre mixing. The field-independence is a normalisation cancellation: the uniform field multiplies both numerator and denominator in the same way and therefore drops out of the leading ratio. ∎
The next input is spectral. Let denote the killed memory operator in activity sector .
Proposition 8.4 (Principal eigenvalue shift).
For each activity sector,
| (8.5) |
The first correction to the visible mean dwell is therefore not purely an effective-rate effect: the leading eigenvalue shift is only one contribution to the full first-order visible correction.
Proof.
At leading order the operator mixes to the fibre equilibrium, so the killed generator sees only the averaged hazard . Standard first-order spectral perturbation around that averaged hazard gives (8.5). The final sentence records that the entry-law and transient-relaxation terms survive at the same order, so the eigenvalue shift alone does not close the visible correction. ∎
The visible-first Schur basis now exposes the full first coefficient. Write the reduced conjugated operator of in that basis as
| (8.6) |
The hidden block diverges like , but the visible line stays fixed. This is precisely why the Schur feedback survives at order .
Theorem 8.5 (First fast-memory correction in visible-first form).
Proof.
For scalar visible rank, Section 3.3 identifies with the visible Schur complement of . Applying the scalar Schur formula to (8.6) gives
Since , rearranging yields (8.7). The identification with the carrier from Section 7 is exactly the statement that the only hidden-mediated channel surviving in visible-first coordinates is the canonical Schur contraction. ∎
Equation (8.7) is the technical centre of the section. It shows why the first correction cannot be read from homogenised rates alone. The visible coefficient remembers hidden resolvent geometry through the single Schur channel .
8.3 Source law and obstruction
We now specialise to the symmetric coupling slice , where the activity-swap involution is exact. Section 7 isolated the canonical hidden carrier . The present question is how that carrier varies with the field in the fast-memory regime.
Theorem 8.6 (Parity and exact perturbation decomposition).
Assume and fix the visible-first basis from Proposition 7.3. Write
and let
Then the canonical hidden carrier
is an even function of . The normalised datum
| (8.8) |
is also even. Moreover, the field defect
admits the exact decomposition
| (8.9) |
where
| (8.10) | ||||
| (8.11) | ||||
| (8.12) |
and
| (8.13) |
Here is row-tail drift, is input-channel drift, is hidden-resolvent drift, and collects the mixed interaction terms.
Proof.
The evenness is the activity-swap symmetry from Section 7: replacing by exchanges the two activity classes while leaving the visible-first scalar contraction invariant, so . Since is itself even, the same holds for .
The point of Theorem 8.6 is structural. There is a clean source law, but there is also a genuine obstruction. After normalisation by , the carrier becomes asymptotically field-blind at leading fast-memory order, yet not exactly field-blind at finite .
Proposition 8.7 (Asymptotic source law and obstruction class).
Assume . Then in the fast-memory regime,
| (8.14) |
and hence
| (8.15) |
In the same regime the odd first-correction coefficients obey the asymptotic redistribution laws
| (8.16) |
Thus the source law is asymptotically clean, while the residual defect sits in an even obstruction class of order .
Proof.
Because is even, its small-field defect must begin at quadratic order in . Fast-memory scaling pushes the coefficient of that even defect down by one power of , which yields (8.14) and (8.15). The redistribution laws follow from the visible-first Schur decomposition of the odd first-correction slope: the scalar part carries a factor, while the hidden Schur part carries a factor. After those factors are divided out, both coefficients approach the same source datum . ∎
At larger depth the same mechanism persists in a parity-resolved form. The fast-memory correction separates into a dominant odd part and a smaller negative even defect; the odd response is linear to first order in small ; and, after parity decomposition, both parity sectors are extensive in depth. That is the sense in which the hidden carrier from Section 7 really does organise the fast-memory layer. It does not solve the whole correction problem, but it isolates the unique dominant odd channel.
8.4 What the first correction is not
The first-correction formula is informative partly because of what it excludes. Every obvious scalar shortcut was tested against the ladder family, and each one fails for a structural reason: the visible coefficient remembers hidden resolvent geometry, not just a few coarse summaries.
First, the carrier itself is not recovered by replacing the exact stationary law with the naive product-limit stationary law. The product-limit picture gets the scaling intuition right, but it does not reproduce the exact hidden contraction at finite .
Second, the coefficient
| (8.17) |
is not determined by the homogenised rate pair alone. Nor is it captured by simple summaries of the entry laws together with those rates. The reason is visible in Theorem 8.5: the term depends on hidden resolvent data that no low-dimensional rate summary can see.
Third, the first-order visible dwell correction is not determined solely by the principal eigenvalue shift (8.5). Entry-law and transient-relaxation contributions survive at the same order. Likewise, in the large- fast-memory regime the odd correction density does not collapse to simple Poisson-energy scalars such as , , , or . Those quantities do not encode the hidden resolvent geometry of the Schur term.
Fourth, the field defect from Proposition 8.7 does not admit a one-slot reduction. The exact decomposition (8.9) proves that row-tail drift alone, input-channel drift alone, and hidden-resolvent drift alone are each insufficient. The mixed channel is not optional. For the same reason, the negative even defect is not generated by continuing the odd carrier to second order in .
Finally, the finite-forcing odd redistribution law is not exact on the full parameter set. The asymptotic source law is real, but away from the fast-memory limit higher-order finite-forcing terms spoil exact factorisation. This is why the source law is a leading-order theorem rather than a full finite-parameter identity.
Taken together, these exclusions are not side remarks. They are the rigidity part of the correction theory. They show that the first visible correction cannot be reduced to homogenised rates, entry-law moments, product-limit stationarity, one-slot field drift, or a continuation of the odd carrier. The visible object is already genuinely higher-order at first subleading order.
8.5 Thermodynamic constraints on the visible object
The correction layer is not unconstrained. The same ladder family that reveals the source law also puts a thermodynamic ceiling on how large the visible object can become. The cleanest summary is one line.
Corollary 8.8 (Thermodynamic ceiling).
Assume the verified half-bound , where is the total entropy production rate. Then
| (8.18) |
Proof.
The ceiling inherits the status of the bound behind it. Within the ladder family the stronger verified statement is
| (8.19) |
with the individual half-bounds
| (8.20) |
These inequalities were verified across the full tested parameter grid, including nonzero . They are programme-core constraints, not a peculiarity of one asymptotic slice.
There is also an exact symmetry statement on the simplest slice. At , , and , all visible Fisher quantities are invariant under the timescale duality
| (8.21) |
In particular,
| (8.22) |
Since the unique fixed point of the duality is , the irreversible correction is maximised there on that slice.
Proposition 8.9 (Complete -profile at ).
At , , and , the quantities , , , and are symmetric in around . Moreover,
| (8.23) |
for all , and the maximum of occurs at .
Proof.
The symmetry in is exactly the duality (8.22). The fixed point of the duality is , so any unique extremum must occur there. The complete profile follows once this is combined with the verified tightness at both timescale extremes recorded below. ∎
The duality is exceptional. It fails cleanly once either of its structural hypotheses is removed: at the odd sector is no longer two-dimensional, and at the activity-exchange symmetry is broken. Those failure modes matter because they show that the duality is a rigid symmetry, not a numerical accident.
The asymptotic tightness statements are the two endpoint companions to the ceiling. In the slow-memory regime,
| (8.24) |
and in the fast-memory regime,
| (8.25) |
So the tangent envelope becomes tight in both timescale extremes, from opposite sides.
Finally, the correction layer has a clean near-equilibrium and small-driving structure. Near detailed balance, with plaquette affinity ,
| (8.26) |
Thus the ratios and remain finite in the linear-response regime. But is not determined by alone. The full Schur object depends on more than the scalar thermodynamic force. Likewise, at small driving with one has
| (8.27) |
so the tangent and irreversible corrections coincide to leading order before separating at quartic order.
8.6 Rigor boundary
Section 8 contains four different epistemic layers, and they should be kept distinct. The homogenised two-state visible precision (8.2) and the visible-first Schur expansion (8.7) are exact once the asymptotic block expansion is granted. The parity statement for and the perturbation decomposition (8.9) are exact on the slice . The field-obstruction class, the EPR-Fisher bounds, the duality, the endpoint tightness laws, and the scaling claims are verified asymptotic or verified structural statements in the frozen ladder programme. The open pieces are the sharp obstruction constants, the operator that generates the even defect, and analytic proofs of the EPR-Fisher bound and the timescale duality.
Two proof routes are visible already. First, an analytic proof of would likely follow if the tangent quantity can be identified as a current-type precision in the sense required by the thermodynamic uncertainty relation. Second, the corridor decay transition discussed in Section 9 looks accessible by a direct spectral-gap analysis of the path-kernel restricted generator. Both are genuine research directions rather than present results.
9 Corridor regime and the regime boundary
Section 8 analysed the fast-memory direction . We now turn a different knob. Fix and , keep the exact symmetry backbone from Section 7, and drive the bias large. A second asymptotic mechanism appears. Its natural carrier is not the visible-first Schur channel of the fast-memory layer, but an odd-sector path kernel with an endpoint Schur complement. The section has two jobs. First, it records the corridor asymptotics cleanly. Second, it proves that this corridor sector is genuinely different from the fast-memory response sector. That separation is a result, not a matter of taste.
9.1 The strong-driving limit
At and , Section 7 gave the exact scalar backbone . The corridor regime asks how the decomposition of that fixed visible precision changes when . The answer is that the reversible part collapses to an endpoint law of order , while the tangent load grows linearly in depth.
Proposition 9.1 (Corridor endpoint law and refined asymptotics).
Fix , , and finite depth . In the strong-driving limit , the odd sector is governed by a path-kernel reduction whose visible output is an endpoint Schur complement. The endpoint law is
| (9.1) |
Consequently, using the exact scalar identity on the same slice,
| (9.2) |
| (9.3) |
and
| (9.4) |
In the archived ladder computations, this convergence is consistent with the refined asymptotic form
| (9.5) |
Proof.
The endpoint law (9.1) is the corridor endpoint Schur computation on the odd-sector path kernel. Section 7 gives the exact identity on the present slice, so
Taking the limit in (9.1) gives (9.4). The ratio limit (9.3) and the tangent limit (9.2) are then equivalent through (9.4). The refined form (9.5) is the verified corridor spectral pattern from the archived ladder computations. ∎
Corollary 9.2 (Trading relation and corridor endpoint).
On the slice and , the pair lies on the exact line
| (9.6) |
Its equilibrium endpoint is and its corridor endpoint is
| (9.7) |
No monotonicity or no-overshoot statement in is claimed here.
Proof.
Remark (Different asymptotic direction, different carrier).
The fast-memory limit and the corridor limit are independent asymptotic directions in parameter space. One sends at fixed and keeps the visible-first Schur carrier. The other sends on the exact-symmetry slice and replaces that carrier by an endpoint Schur law on the odd-sector path kernel. The asymptotic formulas may both involve the same scalar visible objects , but they are produced by different internal reductions.
9.2 Why this is not the same regime
The point of the corridor analysis is not merely that one gets a second formula. The point is that the second formula comes from a different operator sector. The next statement is the load-bearing boundary theorem for Part III.
Proposition 9.3 (Verified regime separation in the current ladder family).
Within the current hidden-feedback ladder analysis, the fast-memory response sector and the large- corridor sector do not behave as one operator regime in disguise. The separation has three independent components.
First, the two sectors use different natural bases: the fast-memory expansion is carried by the true visible tangent vector completed to a visible-first orthonormal basis, whereas the corridor reduction is carried by the odd pair basis.
Second, the two sectors use different carrier geometries: the fast-memory odd response is organised by the canonical hidden Schur carrier
while the corridor sector is organised by an endpoint path-kernel carrier on the odd chain.
Third, the two sectors have different scaling classes on strong-bias slices: the fast-memory odd hidden density remains in , whereas the corridor visible reversible law is .
In addition, for at and , the tangent correction does not factorise as
| (9.8) |
So even inside the corridor sector, depth and driving remain genuinely entangled.
Proof.
The basis statement is the contrast between Section 8, where the visible-first Schur basis is forced by the true visible tangent line, and Theorem 9.1, where the strong-driving reduction lives on the odd pair sector. The carrier statement is immediate from the constructions: Section 8 is driven by the canonical hidden Schur scalar , while the corridor reduction is an endpoint Schur complement of a path Green kernel. The scaling-class statement follows by comparing the verified large- odd-density class from the fast-memory package with (9.1), which is of order at fixed large . The non-factorisation claim is exactly the observed corridor negative boundary: the dependence of on varies with for every tested , so no decomposition of the form (9.8) can hold on that domain. ∎
Remark (What the theorem does not say).
Theorem 9.3 does not deny that a higher containing architecture may exist. It says something narrower and stronger: the present fast-memory and corridor sectors are already provably distinct at the level of basis, carrier, and scaling class. Any future programme would therefore have to contain both sectors without collapsing these differences.
9.3 The regime boundary
The present theory is therefore genuinely multi-regime. Section 7 gives the exact scalar backbone at and . Section 8 gives the visible-first Schur carrier in the fast-memory direction. The present section gives the endpoint path-kernel carrier in the strong-driving direction. These are all real pieces of the same correction programme, but they are not yet one unified operator sector.
Proposition 9.4 (Current regime boundary).
The current correction theory consists of at least two distinct asymptotic sectors beyond the exact-symmetry backbone: the fast-memory sector of Section 8 and the corridor sector of Theorem 9.1. A higher operator architecture containing both sectors without collapsing their distinctions remains open.
Proof.
The strength of Proposition 9.4 is that it says exactly enough. It does not pretend that the present paper has a single master kernel. It proves the boundary instead. That is the honest state of the theory.
9.4 Large- scaling
The strong-driving corridor endpoint is only one part of the depth story. The fast-memory package also revealed a depth-normalised odd hidden density whose behaviour across is remarkably stable. That object is not the corridor carrier, but it is the main large- datum that survives the present correction analysis, so it belongs here at the regime boundary.
Proposition 9.5 (Verified large- odd-density class).
At and on tested slices, the normalised odd hidden density is consistent with the asymptotic class
| (9.9) |
This is finite-limit evidence in a stable asymptotic class, not a proved limit theorem.
Proof.
The statement summarises the verified large-depth fits: after the extensive factor is removed, the data are consistent with a stable linear-in- correction and a smaller residual. The point here is not to claim a proof of limit existence, but to record the stable asymptotic form supported by the current computations. ∎
Proposition 9.6 (Crossover at is not a singular threshold).
Across the tested large- window, the approach direction in (9.9) changes across : it is from below for , from above for , and nearly flat near . At present there is no numerical evidence that is a singular threshold in the odd hidden density itself.
Proof.
The sign of the leading correction changes across , which forces the approach direction to switch. At the same time, the underlying scans remain smooth in a neighbourhood of , so the available evidence supports a crossover centre rather than a singular carrier threshold. ∎
Two open problems remain attached to this large- sector. First, the actual limit function is not yet identified analytically. Second, the special role of is only phenomenological. We know it marks the centre of the observed crossover in approach direction, but we do not yet know whether it carries a deeper operator meaning. Those are the natural questions left by the present data.
10 Benchmark synthesis and evidence
Parts I-III built the quotient-visible theory and then opened the hidden-feedback ladder family in enough detail to expose its multi-regime correction architecture. The remaining question is methodological as well as external: while algebraic closure was still being pinned down, did the theory stay tied to a real signal under deliberately varied tests? The four archived studies were the sequence of tests used to answer that question. They were not run after the final closure layer was in hand, and the paper should say so openly. Their role was to keep the developing theory sharply grounded while the algebraic picture was still being fixed. That is also why the main text does not pretend they already use the final closure method. Read at their true historical strength, they do exactly what Part IV needs. One study supplies an exact transformed semi-Markov anchor, one supplies same-visible-law completion tests, one supplies a decoupling benchmark in which visible precision survives while observed entropy production vanishes, and one supplies the exact visible-law family that eventually made the completion picture and closure push possible.
10.1 Why these four tests matter
These four tests probe four different structural predictions, and they do so in roughly the order the theory itself was being stabilised. The Kapustin-Ghosal-Bisker transformed semi-Markov test asks whether exact transformed visible structure can exist in a finite partially observed system and whether the exact compression mechanism is genuinely structural rather than numerical [47]. The matched-completion tests ask whether the total algebraic visible quantity survives when the hidden completion is changed without changing the visible law; in the archive this includes both abstract matched completions and a real-model sanity check built from the Liepelt-Lipowsky six-state kinesin chemomechanical network [48]. The Banerjee-Kolomeisky-Igoshin proofreading test asks whether visible precision can remain nonzero after coarse observation kills the observed entropy-production signal on a biologically motivated kinetic proofreading model [49]. The hidden-feedback ladder test family asks whether visible memory, hidden dissipation, and visible algebraic correction can be separated inside one exact visible-law family with genuine two-way hidden feedback. Together they test exact structure, invariance, decoupling, and frontier behaviour while also documenting the route by which the theory was kept empirically disciplined before final algebraic closure was achieved.
10.2 Exact transformed semi-Markov anchor
The Kapustin-Ghosal-Bisker transformed semi-Markov benchmark [47] remains the cleanest exact transformed anchor in the archive. On the canonical four-state benchmark, the transformed observer has an exact sequence-level gain, the transformed waiting-time contribution vanishes exactly, and the exact compact observer is the four-symbol second-order parity lift recorded in the archived theorem spine. That exact compression mechanism is not merely approximate: it retains the transformed quantity at machine precision on the benchmark, while the threshold-2 observer remains near-exact but not exact. The same archive also carries the right negative contrast. In the flashing ratchet test there is no comparable compact exact lift, and the best compact retentions remain far below the exact four-state parity benchmark.
The algebraic layer extracted from the same test is also scientifically useful. On the benchmark four-state system it reports
So the exact transformed anchor sits in an overwhelmingly backbone-dominated regime. This test therefore does two jobs at once. At the semi-Markov level it provides the exact transformed benchmark promised in Appendix D. At the algebraic level it gives a small but nonzero visible correction on a benchmark whose transformed structure is known exactly.
10.3 Same-visible-law completion tests
These matched-completion tests probe the claim that the total scalar visible quantity survives same-visible-law completion changes even when the hidden architecture is radically altered. Its strongest archived result is the four-state versus fourteen-state same-law comparison:
This is the exact kind of test Section 3 asks for. The visible law is held fixed while the hidden phase representation is enlarged, and the total visible algebraic precision survives to machine precision. The decomposition beneath that total does not stay fixed. In the archived outputs the four-state system has
whereas the fourteen-state completion has
So this test demonstrates the right invariant and the right non-invariants in the same comparison.
The archive also contains a second independent same-law check at the renewal level. Duplicating one hidden state to produce an augmented five-state system preserves the visible semi-Markov law exactly and leaves the visible correction unchanged to machine precision,
That second check matters because it rules out the possibility that the fourteen-state match is a one-off feature of a particular phase-type construction.
The same archive also contains a useful real-model sanity check based on the six-state Liepelt-Lipowsky kinesin chemomechanical network, observed through a two-class D-versus-T readout [48]. For that test the archived values are
This is not a same-law completion test. It is a reminder that once the hidden topology really carries a cycle current visible to the chosen partition, the quotient-visible correction can be large.
10.4 Banerjee-Kolomeisky-Igoshin proofreading test
The Banerjee-Kolomeisky-Igoshin proofreading test probes a different prediction, namely that visible precision need not track observed entropy production after coarse observation on a biological error-correction network [49]. Under the default closure, all three coarse observers in the archived Banerjee benchmark retain exactly zero observed entropy production, but the quotient analysis reports nonzero visible precision for all four presets. On the scalar E-only observer the archived values are
for the WT, HYP, ERR, and T7 presets respectively. On the correct-versus-wrong observer the corresponding traces are
So in this test zero observed entropy production emphatically does not imply zero visible precision.
The test also tells us what kind of decoupling this is. The archived irreversibility fractions remain modest,
across the four presets. The visible algebraic object is therefore still backbone-dominated. What survives the coarse observation is not a large visible irreversible sector but a finite local precision object supported by hidden structure that the coarse entropy-production observer cannot see.
This test archive also contains the right negative control. When the closure is changed in a way that changes the visible semi-Markov law, completion independence fails exactly as it should. The archive compares a five-state turnover closure to a seven-state product closure and finds visibly different values for the same coarse observer. That failure is a feature, not a bug. It shows the test is probing the correct invariance statement: same visible law, not arbitrary closure change.
10.5 Hidden-feedback ladder test family
The hidden-feedback ladder test family has a dual status in the paper. It is a benchmark family in its own right, and it is also the system through which the completion picture and later closure push became possible. It therefore has to be framed more carefully than the other three archives. The archived ladder runs predate the final algebraic-closure stage, but they already give an exact visible-law family of the right kind: under the activity-only observer the visible process is an exact alternating semi-Markov process with phase-type dwell laws. The promoted atlas then separates baseline Markovity, recorder-only hidden dissipation, modulator-only visible memory, two-way adaptive feedback, and equilibrium-feedback reversible controls. Historically, this is the family that kept the theory anchored while the algebraic closure mechanism was still being isolated.
The equilibrium-feedback line is the cleanest control in the archive. The points labelled eq_feedback_weak and eq_feedback_strong both have and entropy production at numerical zero, but their visible dwell coefficients of variation are and respectively. So the archive contains memory-rich visible laws with effectively zero plaquette-level dissipation. At the algebraic layer both points satisfy
and therefore act as reversible memory controls for the correction theory.
The recorder and modulator points then separate hidden cost from visible memory. The archived pure_recorder point has
so it carries substantial algebraic visible correction without visible non-Markovity. By contrast the archived pure_modulator point has
so it carries visible memory with only a very small algebraic correction. That single pair is already enough to show that visible memory, hidden cost, and visible correction are three different coordinates in this family.
The adaptive and depth-sensitive points push the family to the current boundary. The archived adaptive_strong point has and ; adaptive_slow has smaller dissipation but remains visibly non-Markov; and the depth_sensitive_hidden_resolution point changes the visible law only moderately while remaining noticeably nonlinear and numerically stiff. The frozen nonlinear report is already scientifically informative, but it explicitly classifies several promoted points as optimisation-sensitive rather than fully bankable closure constants. That is the correct boundary to state in the main text, especially because these runs were part of the route toward closure rather than post-closure victory laps. The exact backbone and the promoted algebraic layer are bankable now; the nonlinear layer is qualitatively supportive and quantitatively selective.
10.6 Cross-test synthesis
-
(i)
The Kapustin-Ghosal-Bisker transformed semi-Markov test shows that exact transformed visible structure can exist in a finite benchmark and can admit an exact compact observer, but the ratchet contrast shows that this is a structural mechanism, not a generic compression miracle.
-
(ii)
The matched-completion tests show that at scalar visible rank the total visible algebraic precision can survive drastic same-law completion changes even while the backbone-correction split moves substantially underneath it.
-
(iii)
The Banerjee-Kolomeisky-Igoshin proofreading test shows that visible precision and observed entropy production can decouple sharply under coarse observation, exactly in the direction predicted by the quotient-visible theory.
-
(iv)
The hidden-feedback ladder test family shows that visible memory, hidden dissipation, and visible algebraic correction are genuinely distinct coordinates and can be separated inside one exact visible-law family.
-
(v)
Across all four archives, the honest reading is methodological as well as mathematical: these were the tests used to keep the developing theory tied to a real signal while algebraic closure was still being isolated. That is why they matter historically, and it is why the main text reads them at their archived strength rather than pretending they were post-closure reruns.
-
(vi)
The current boundary is not absence of structure but controlled selectivity: the exact and algebraic layers are already strong, whereas the nonlinear branch is informative only where the archived optimisation diagnostics say it is stable enough to trust.
11 Synthetic falsification battery and blind benchmark
Section 10 showed that the theory remains coherent across independent benchmark tests grounded in transformed semi-Markov inference, biological proofreading, and molecular-motor coarse observation [47, 49, 48]. This section applies a stricter standard. The point is not further illustration, but deliberate adversarial pressure on the sharpest structural claims. We therefore separate two forms of stress. First, a synthetic falsification battery targets the exposed theorem-level predictions directly. Second, a blind digital benchmark asks whether locked predictions made from restricted visible data survive reveal of the hidden world.
11.1 Falsification principles and synthetic battery
The synthetic battery was designed to attack the claims that would most clearly fail if the theory were tracking numerical artefacts rather than genuine structure: quartic bridge scaling, support preservation beneath quotient observation, the paired-spectrum obstruction to fixed-dimension closure, graph-local decay, and the corridor-versus-bundle extremiser picture. The tests were not tuning exercises. Each family was built to try to break a definite prediction.
| Diagnostic | Tested regime | Quantitative outcome | Interpretation |
|---|---|---|---|
| Quartic bridge slope | -adapted bridge sweeps with visible and hidden dimensions to | Grand mean slope ; nine dimension-pair means from to | Consistent with the quartic hidden-mediation bridge and stable across the tested dimension range. |
| Worst bridge-gap eigenvalue | Same adapted bridge sweeps | Worst reported bridge-gap eigenvalue | Numerically nonnegative up to floating-point tolerance, as required by the sign-definite quartic bridge law. |
| Support preservation | Same adapted bridge sweeps | Rank-preservation rate ; maximum reported principal-angle sine | Finite hidden sectors preserve tangent support to numerical precision, matching the support-rigidity theorem. |
| Same-dimension closure | Generic quotient Gaussian ensembles with visible dimensions to | Failure fraction throughout; pairable fraction throughout | Generic same-dimension skew-square closure fails completely in the tested ensemble, matching the paired-spectrum obstruction. |
| Hidden-local decay bound | Random local hidden graphs of size , , and | Bound-compliance rate across all sampled size-distance cells | Visible long-range transfer behaves as a controlled hidden-local tail, consistent with the graph-local decay theory. |
| Topology and bundle tests | Paths, cycles, ladders, trees, and disjoint corridor bundles | Corridor geometry realises the sharp decay class; disjoint bundles give flat singular spectra; under the tested finite-distance normalisation the best one-channel performer was the cycle | Supports the rate-level corridor picture and the flat-spectrum many-channel extremiser law while refining the finite-distance prefactor statement. |
The outcomes are clear. Across the adapted bridge sweeps the quartic slope stays pinned near , the bridge-gap eigenvalue remains at floating-point scale, and support preservation holds to numerical precision. Across visible dimensions to , generic same-dimension skew-square closure fails in every sampled case. Across the hidden-local graph families, every tested transfer entry obeys the decay bound. The one substantive refinement forced by the synthetic battery is finite-distance rather than structural: the one-channel topology statement should be made at the level of universal exponential rate, not universal finite-distance constant, because looped topologies can improve prefactors under the tested spectral-window normalisation.
11.2 Blind digital benchmark
The blind benchmark was designed as a lock-then-reveal protocol. The hidden world was fixed first, only a restricted visible sector was exposed, predictions were committed before reveal, and only then was the concealed world released for scoring. The point of this protocol was not to enlarge the theorem domain of the paper. It was to check whether the existing finite tangent law, quotient-visible attenuation geometry, and Bell-frontier compatibility theory can function as an instrument when the hidden world is genuinely withheld.
Each digital world coupled three exact layers. First, a finite-state nonequilibrium backbone fixed the reduced detailed-balance geometry , the skew object , and the finite Donsker-Varadhan signal on the observer space. Second, an adapted visible sector fixed the tangent ceiling , and the actual quotient-visible correction was generated inside the proved attenuation class
Third, Bell-context families were attached in three exact types: commonly glueable families, Bell-local but variance-inconsistent families, and variance-consistent families with arcsine-CHSH violation. Hidden truth and visible challenge artefacts were separated on disk, and the analysis stage read only the visible manifest before reveal.
On the exact-mode hero world, the relative errors were for the retained-signal curve and for the detectability curve . On the quotient side, the minimum hidden dimension and contraction-volume scores were recovered exactly in the recorded score files, with identity residuals at machine scale. The stronger test is the frozen 256-world exact ensemble. Across that ensemble the mean relative error was for the finite -curve and for the detectability curve . Quotient scores again remained exact on the recorded ensemble, Bell verdict agreement was , locality compatibility matched in of worlds, and motif agreement was . We therefore treat locality only as a class-level diagnostic reader, not as an exact hidden-graph reconstruction claim.
Two cautions are essential. First, the sampled track is a robustness layer, not the primary claim. On the sampled hero world the finite module remained stable and quotient scores again remained exact, but the sampled Bell layer missed glueable families, so the sampled benchmark should be read as interface support rather than as the cleanest statement of the law-level frontier. Second, adaptive reveal is already informative but should still be described cautiously. On a 64-world exact panel, oracle theorem-target reveal improved the mean second-step raw revealed signal over a random baseline by and the corresponding detectability score by . We therefore treat adaptive reveal as a diagnostic of what the observation ladder can target next, not yet as a deployed blind acquisition policy. Detailed benchmark diagnostics are collected in Appendix E.
11.3 What survived and what did not
The falsification pressure was productive because it did not leave the theory unchanged. What survived is the structural core. The quartic bridge law, support preservation, the paired-spectrum obstruction, and the hidden-local decay bound all survived direct adversarial testing. The exact-track blind benchmark also survived in the sense that the finite tangent law, quotient-visible attenuation geometry, and Bell-frontier verdicts remained operational under a real lock-then-reveal protocol.
What did not survive unchanged are the stronger informal readings that were never entitled to theorem status. The one-channel topology claim had to be weakened from a universal finite-distance statement to a universal rate statement. Motif reconstruction did not become an exact hidden-graph reader. The sampled Bell layer is not yet a clean benchmark instrument. And adaptive reveal remains a promising diagnostic policy rather than a finished acquisition procedure. That is the right outcome for this section. The theory survives where it claimed structural necessity, and it bends precisely where the data says only a weaker statement is justified.
12 Scope, guardrails, and transfer boundaries
This section states the status boundaries of the paper in one place. Its purpose is not rhetorical. It is to tell the reader exactly which statements are proved, which are asymptotic theorems, which are verified but not yet proved, and which questions remain open. The division below is the contract under which the rest of the paper should be read.
12.1 What is proved: the abstract algebraic theory
The abstract quotient-visible theory developed in Sections 2-6 is proved at the level stated in the theorem bodies. For any quotient observation on the positive cone, the paper proves the variational characterisation of quotient precision, its homogeneity, monotonicity, and concavity, and its exact composition along towers of surjections. In that sense the central visible object is not an ad hoc diagnostic but the intrinsic visible variable of quotient observation.
The same abstract theory also proves the internal algebraic structure of the visible object once a tangent ceiling has been fixed. Hidden mediation preserves support, every support-preserving visible law in the interior beneath the ceiling is parametrised by a positive hidden-load operator, sequential mediation transports that load by an exact Schur law, the determinant clock is the unique continuous orthogonally invariant additive interior clock, and the visible precision splits exactly into the reversible contribution and the irreversible correction through the conservation identity . These statements are exact structural results, not asymptotic approximations.
The locality and compatibility results proved in Sections 5 and 6 belong to the same exact quotient-visible theory. Graph-local hidden precision yields componentwise mediation and exponential graph-distance suppression of long-range visible coupling, with corridor architectures realising the universal asymptotic rate class. On the Bell square, common visible Gaussian gluing is proved to be equivalent to remote-setting variance consistency together with Bell-locality of the arcsine lift, and this yields the single-readout CHSH guardrail as a downstream consequence of common gluing. These results hold at the level of quotient-visible law geometry itself; they do not depend on the hidden-feedback ladder analysis of Sections 7-9.
12.2 What is proved and verified: the nonequilibrium analysis
The nonequilibrium analysis in Sections 7-9 is carried out for the hidden-feedback ladder family. Within that family, several statements are exact. At and , the activity sign mode is an exact generator eigenmode, the visible tangent line is an exact eigenline of the reduced conjugated generator, the scalar visible precision satisfies exactly, and the symmetric-point identities linking , , , and hold exactly. At for arbitrary field, the true visible line remains exact, the visible-first reduced basis is exact, and the odd first-correction slope is carried by the canonical hidden scalar , which is invariant under orthogonal changes of hidden complement.
The same ladder analysis also contains proved asymptotic statements. In the strong-bias corridor regime at and , the reversible visible law, the tangent correction, and the ratio obey the explicit corridor asymptotics stated in Section 9. Those are genuine asymptotic theorems for that regime. They are not merely numerical trends, but they do not imply that the corridor carrier and the fast-memory carrier are one and the same object.
A larger part of the ladder analysis is verified rather than proved. This includes fast-memory homogenisation to a two-state visible chain, convergence of to the homogenised value, decay of in the fast-memory tail, the first-correction structure beyond the leading homogenised rates, the field-normalised source law and its obstruction class, the large- normalised odd sector, the timescale-duality profile on the , , slice, the EPR-Fisher bounds, endpoint tightness in the slow-memory and fast-memory limits, near-equilibrium scaling, and the small-driving symmetry of and . Throughout the paper these statements are presented as verified asymptotic or verified structural facts, not as already-promoted theorems.
The benchmark studies of Sections 10 and 11 do not enlarge the theorem boundary. Their role is methodological. They show that the developing algebraic picture was kept tied to a real signal while closure was being pinned down, and they apply adversarial pressure to the visible object and its diagnostics. They support transfer and robustness, but they are not used to convert verified statements into proved ones.
12.3 What remains open
Completion independence of beyond the proved case remains open, and this matters because a full visible-law descent theorem would identify the exact minimal visible carrier of the algebraic quantity beyond the scalar benchmark. The multiplicative mechanism behind the identities is identified but not yet proved analytically in full Schur-termination form. The field-law package does not yet have sharp operator constants beyond the present obstruction class .
The large- odd sector has a stable asymptotic class in the tested range, but a proved limit theorem and an explicit identification of the limit function remain open. The status of the crossover near is also open at the operator level: the numerical evidence identifies a change in approach direction, but not yet a deeper structural interpretation. The operator generating the negative even defect has not yet been identified, and its relation, if any, to the odd hidden carrier is not known.
At the level of regime architecture, it remains open whether there exists a higher operator framework that contains both the fast-memory and corridor sectors without erasing their distinction. The EPR-Fisher bound and the timescale duality are currently verified rather than analytically proved. The full nonlinear Markov re-embedding problem after quotient observation also remains open. Finally, the transfer from the present discrete quotient-visible architecture to any genuine continuum or dynamical gravity theory is open; the paper proves structural parallels only, not a continuum field theory.
12.4 Transfer question
The abstract quotient-visible theory of Sections 2-6 is independent of the hidden-feedback ladder. Its statements are formulated for quotient observation on positive precision operators and therefore transfer at that level without reference to any one benchmark family. The ladder enters only when the paper asks what the visible object looks like inside a nonequilibrium system and how the first correction organises itself.
The analysis of Sections 7-9 is ladder-specific in its present form. The exact symmetry results, the fast-memory source law, the obstruction package, the corridor asymptotics, and the regime-separation statements are established for that family. Sections 10 and 11 then test partial transfer: the archived kinesin and proofreading studies show that the algebraic observables remain meaningful under controlled biochemical observers, the transformed semi-Markov benchmark shows that the visible programme survives a nontrivial observer change, and the falsification battery shows that the diagnostics are not tuned to one toy topology. What those tests do not yet prove is that the ladder-specific correction architecture transfers unchanged to every binary-visible nonequilibrium system.
The paper therefore draws a sharp line. The quotient-visible theory transfers as abstract geometry. The correction architecture is presently established in one benchmark family and partially pressure-tested beyond it. The transfer question is real, and the paper treats it as open where it has not been proved.
12.5 What the present paper does not claim
The paper does not claim a full ontological unification of the fast-memory and corridor regimes.
It does not claim a continuum field theory, a dynamical gravity theory, or an Einstein-equation analogue.
It does not claim a nonlinear Markov re-embedding theorem after quotient observation.
It does not claim a general visible-law descent theorem beyond the proved scalar case.
13 Discussion
13.1 Why is the intrinsic visible variable
The central interpretive claim of the paper is now sharp. The intrinsic visible variable is quotient precision , not the Donsker-Varadhan Hessian taken at fixed visible dimension. The reason is structural, not stylistic. Section 2 proves that quotient observation composes exactly along towers, and Theorem 2.6 makes that closure explicit. Section 3 then shows that the Donsker-Varadhan bridge remains essential, but as a bridge variable: it is the route by which the microscopic skew-square structure descends to a visible algebraic object. What closes under observation is the quotient-visible precision itself. Later work sharpens this boundary further. There is no canonical nontrivial ceiling determined by alone, so hidden-load and determinant-clock variables become exact only after a ceiling or reference has been declared. By contrast, quotient precision is intrinsic to the observed pair itself. This is why the visible variable closes under observation towers, while ceiling-mediated hidden comparison adds further exact structure only after the ambient reference has been fixed.
That distinction is not cosmetic. The tangent closure statement in Corollary 3.5 identifies the Donsker-Varadhan skew-square sector as the tangent microscopic cone inside a larger quotient-visible attenuation class. Section 4 explains the geometry of that larger class by hidden load, support rigidity, additive clock, and conservation. Once those structures are in place, the right reading is forced: the Donsker-Varadhan Hessian is the bridge variable that generates the correct visible object, while is the visible invariant that survives composition, hidden elimination, and law-level comparison.
At scalar visible rank the conclusion is even stronger. Within that domain, ceiling, clock, precision, clock additivity, and conservation form a closed scalar system. The tangent ceiling fixes where visible correction can live, the determinant clock measures hidden contraction volume, and the conservation split from Section 4 separates reversible and irreversible visible contributions without leaving the quotient-visible framework. In that precise sense, the scalar visible theory is complete: it is not merely a collection of formulas, but a closed algebraic system for the visible object. Conceptually this places the visible side of the theory closer to an information-geometric coarse description than to a fixed-dimension microscopic parametrisation [50, 51, 52].
13.2 What the DV bridge means after quotient reduction
The bridge from Finite is not demoted by the quotient theory. It is repositioned. Before quotient reduction, the bridge organises the microscopic correction as a skew-square law built from the reversible backbone. After quotient reduction, that same bridge is understood as the doorway to the right visible object. It tells us how the microscopic correction enters the visible sector, but it does not itself define the renormalisation-natural invariant. The visible algebraic object of Section 3 is therefore best read as the bridge’s finite descendant, while is the quotient-theoretic object that remains well defined after observation towers, hidden mediation, and law-level comparison have been taken seriously.
13.3 Apparent nonlinearity as coordinate artefact
Within the paper’s proved domain, apparent nonlinearity repeatedly resolves into one of two things. Either it disappears after the correct coordinate choice, or it reappears as a finite-dimensional algebraic feature with explicit operational meaning. Section 4 is the clearest example. Hidden-load composition looks nonlinear in the raw visible variable , but becomes additive transport in the determinant clock and linear order on the hidden-load cone. The same phenomenon appears in Section 6: Bell-square compatibility looks nonlinear in correlator language, but after the arcsine lift the compatible region becomes a hypercubic coordinate constraint with exact repair by clipping. In both cases the apparent nonlinearity is not false, but misplaced. It belongs to the choice of coordinates rather than to the underlying compatibility law.
This claim must be stated with its boundary. The paper does not assert that all nonlinearity in nonequilibrium observation theory is a coordinate artefact. It asserts a narrower and stronger statement: within the quotient-visible theory developed here, every nonlinear structure that has been brought under exact control either linearises in canonical coordinates or reduces to a finite-dimensional algebraic feature with explicit physical meaning. Hidden-load composition, Bell-square compatibility, and the scalar visible Schur laws are the proved examples. Beyond that domain, the paper makes no general ontological claim.
13.4 The multi-regime architecture
One of the paper’s mature conclusions is that the nonequilibrium visible theory is genuinely multi-regime. The abstract quotient-visible theory of Sections 2-6 is exact and regime-independent. The hidden-feedback analysis of Sections 7-9 is not. It splits into an exact symmetry backbone, a fast-memory response sector, and a strong-driving corridor sector. The paper does not hide that separation. It proves it.
That separation is a strength. Section 8 shows that fast-memory response is organised by the visible-first Schur carrier, the canonical odd hidden response scalar, and a source law with explicit obstruction. Section 9 shows that the strong-driving corridor regime is controlled instead by path-kernel endpoint Schur laws and a distinct scaling architecture. The regime-separation theorem, Theorem 9.3, and the current boundary statement in Proposition 9.4 make the point sharply: these are not two parametrisations of one already unified operator sector. They are two real asymptotic sectors with different carriers, different dominant mechanisms, and a currently open containing architecture.
The hidden-feedback ladder therefore teaches two lessons at once. First, the visible object is rigid enough to support exact symmetry laws, asymptotic source laws, regime boundaries, and thermodynamic constraints. Second, those laws do not collapse into one prematurely simplified picture. The theory has become strong enough to prove the separation, and that is a more valuable outcome than a forced unity would have been.
13.5 Geometric structure of quotient observation
The quotient map is also geometric in a precise sense.
Remark (Affine-invariant geometric viewpoint).
Equip with the affine-invariant metric
In the metric-normalised shadow coordinates of Section 2, the differential of
acts by the coisometric compression of Theorem 2.7. This is the tangent-level isometry condition one would need for a Riemannian-submersion interpretation of quotient observation in the affine-invariant geometry of the positive cone.
That geometric reading is enough for the present paper. A full Riemannian-submersion theorem would additionally require an explicit horizontal distribution, surjectivity of the differential onto the visible tangent space, and a complete metric-preservation argument on horizontal directions. We do not supply that full proof here. What the paper uses is the tangent coisometry and the resulting structural analogy.
It is equally important to state what this does not mean. The determinant clock from Section 4 is not the affine-invariant geodesic distance once visible rank exceeds one. Its additivity comes from multiplicativity of determinant under hidden-load composition, not from metric geodesic length. The geometric parallels do not amount to an Einstein equation, a dynamical gravity theory, or a proved continuum limit. What the paper has established is kinematic geometric structure, not a gravitational dynamics.
13.6 Later exact refinements
Subsequent work sharpens three edges without changing the paper’s main claim. First, common-Hilbert compression identifies the visible metric as the pullback of the quotient norm on least-energy lifts, giving an exact common-Hilbert root for the same quotient-visible object. Second, exact one-generator closure is now classified by common visible Gram factorisation: the generic exact scalar law is a finite Stieltjes sum, while the Möbius law appearing here is the one-pole special case. Third, the descended passive question is closed at the positivity level by a reduced congruence witness after hidden elimination, leaving minimal-memory realisation, rather than positivity inheritance, as the remaining frontier.
The same continuation also shows that support-stable dynamic closure is governed by common invariant-subspace structure for the coupled support-local generator family, and does not alter the quotient-visible theory proved here. It clarifies its continuation: quotient precision remains the intrinsic visible coordinate, while exact closure, passive descent, and stratified transport supply the next algebraic layers beyond the present paper.
Appendix A Bell and temporal frontier details
This appendix provides the technical details underlying Theorem 6.2, Proposition 6.3, Corollary 6.4, and the temporal-frontier discussion in Section 6.
A.1 Gaussian gluing on the Bell square
We first isolate the Gaussian completion problem behind Theorem 6.2. Write
where the one-site variances are assumed to satisfy the remote-setting consistency conditions (6.3). Let denote the bipartite elliptope, namely the set of all matrices of the form
Proposition A.1 .
Under the variance-consistency conditions (6.3), the following are equivalent.
-
1.
There exists a centred Gaussian law on whose marginals are exactly .
-
2.
The normalised cross block belongs to .
If the resulting full covariance is positive definite, this is equivalent to common Schur gluing of the visible pair precisions.
Proof.
Assume first that a common centred Gaussian law exists. After standardising each coordinate by its one-site standard deviation, one obtains a correlation matrix on with diagonal entries equal to and cross block equal to . Every correlation matrix is positive semidefinite and therefore a Gram matrix of unit vectors. Hence .
Conversely, suppose for unit vectors . Form the block Gram matrix
Now scale by the diagonal matrix
Then is a covariance matrix whose marginal block is exactly . If , inversion yields a visible precision , and each pair precision is the corresponding Schur complement block. This is exactly common Schur gluing. ∎
Proof of Theorem 6.2.
By Proposition A.1, common Gaussian gluing is equivalent to variance consistency together with membership of the normalised cross block in . For pair precisions,
which is (6.2).
Now define
Standard Bell-square facts identify the frontier in three equivalent ways [53]. Fine’s theorem characterises Bell-locality of by the CHSH inequalities, the Gaussian sign-correlation formula shows that is the correlator table of the signs of a Gaussian family with correlation matrix having cross block , and the same lifted correlator set is the relevant bipartite elliptope in the Bell square. Hence if and only if the lifted correlator table is Bell-local, equivalently if and only if the four arcsine CHSH inequalities (6.4) to (6.7) hold. Combining this with Proposition A.1 proves the theorem. ∎
A.2 Strict refinement over Bell-locality
Proposition 6.3 already gives the minimal counterexample. The point is structural: Bell inequalities constrain only the binary-output correlator shadow, while common Gaussian gluing constrains the full pair law. The diagonal sector is therefore visible to the quotient frontier even when the Bell shadow is trivial.
A convenient quantitative summary is to separate the two obstructions. Define
| (A.1) |
and let be the excess of the largest left-hand side of (6.4) to (6.7) above , truncated below at zero. Then common gluing on the Bell square is equivalent to the simultaneous vanishing of both obstructions,
This packages the Bell-square frontier as a two-coordinate compatibility problem: one coordinate is invisible to Bell correlators, while the other is the usual arcsine correlator obstruction.
A.3 Low-rank mediated Gaussian sign shadows
The Bell-local shadow can itself be realised by a very small mediated Gaussian model.
Corollary A.2 .
Let be a Bell-local correlator table, and set
Then there exist unit vectors and a standard Gaussian such that
Thus every Bell-local Bell-square correlator table already sits inside a rank-two Gaussian sign-shadow.
Proof.
By Theorem 6.2, Bell-locality of is equivalent to . Thus there exist unit vectors in some Euclidean space with . Let , so , and let be the orthogonal projection of onto . Then for all . Choose and independent standard Gaussians , and define
These are centred Gaussian variables with unit variances and cross-correlations . The Gaussian sign-correlation formula gives
as required. ∎
A.4 Bell cube normal form and exact repair
The Bell square admits a global normal form in lifted coordinates. This globalises the one-face repair formulas and makes the Bell witness geometry completely explicit.
Theorem A.3 .
Let be the matrix whose rows are the four CHSH sign vectors
Then
For
the Bell-compatible region in arcsine coordinates becomes
Equivalently, the Bell square is globally the cube in the lifted coordinates . Moreover,
Hence the Euclidean nearest-point map is coordinatewise clipping,
and the squared Euclidean distance to the Bell frontier is
If only one lifted CHSH coordinate violates the cube, with defect , then the repair is
Proof.
The four inequalities (6.4) to (6.7) are precisely
Since the rows of are the vectors , this is equivalent to for all , so the compatible region is the cube in the lifted coordinates. Direct computation gives , hence and therefore
The Euclidean metric transforms accordingly,
because . Euclidean nearest-point repair in is therefore just coordinatewise clipping to the cube, and transforming back gives the stated projection formula and distance formula. If only one coordinate exceeds the cube by , then clipping changes only that coordinate by , so
which also gives . ∎
Corollary A.4 .
For any covector , the Bell support function in arcsine coordinates is
Proof.
Using and , one has
∎
A.5 Observation graphs and the first temporal clique
The Bell square is the first nonchordal compatibility graph treated in the main text. The same gluing question may be asked on any finite observation graph, with Bell and temporal contexts appearing as two graph-indexed instances of one Gaussian pair-law completion problem. The next proposition isolates the law-level object.
Proposition A.5 (Graph-indexed Gaussian gluing).
Let be a finite graph. For each edge , let
Then there exists a centred Gaussian law on whose marginal is for every edge if and only if both of the following hold:
-
(i)
vertex variance consistency, namely there exist numbers with
-
(ii)
correlation completion, namely there exists a correlation matrix on such that
Proof.
If a global centred Gaussian law exists, its one-site variances are independent of which edge marginal is inspected, so (i) holds. Dividing the global covariance by the diagonal standard-deviation matrix gives a correlation matrix with the stated edge restrictions, so (ii) holds.
Conversely, assume (i) and (ii). Let and set . Then and every edge marginal is
because and the visible variances agree by (i). ∎
The contextual object is therefore the edge-correlation completion set
Bell and temporal inequalities sit below as readout shadows. At law level the primary obstruction is gluing failure for the full pair laws.
The next theorem identifies the easy graph class.
Theorem A.6 (Chordal clique gluing).
Let be a chordal graph with maximal cliques . For each clique , let be a centred Gaussian law with positive definite clique covariance. Assume that whenever two neighbouring cliques in a clique tree meet in a separator , the induced -marginals of and agree. Then there exists a centred Gaussian law on all of whose -marginal is for every .
Proof.
The key separator-gluing step is explicit. If centred Gaussian laws on index sets and agree on the overlap , then
defines a centred Gaussian law on with the prescribed - and -marginals. The quotient is well-defined because the overlap marginal agrees, and direct integration recovers the stated marginals.
Now choose a clique tree for and argue by induction on the number of cliques. For one clique there is nothing to prove. For more than one clique, remove a leaf clique with separator . By induction the remaining clique family admits a common Gaussian law. Gluing that law to across by the separator formula above produces the desired global Gaussian law. ∎
In particular, if is a tree, then the maximal cliques are just edges. Hence edgewise positive pair laws together with vertex variance consistency are sufficient for common Gaussian gluing. Trees therefore have no further law-level obstruction. The first genuinely nontrivial temporal obstruction appears when one passes from a tree to the first temporal clique.
The first fully observed temporal case is the triangle . Because it is chordal, the correlation-completion condition reduces to positivity of the single correlation matrix.
Theorem A.7 (Exact three-time triangle theorem).
Let be centred Gaussian pair laws with entries
There exists a centred Gaussian law on with these three pair marginals if and only if
and
Equivalently,
| (A.2) |
Proof.
Corollary A.8 (Temporal sign-shadow tetrahedron).
Let be any centred Gaussian triple satisfying Theorem A.7, define , and set
Then
and the lifted correlator triple lies in the classical three-variable correlation tetrahedron:
| (A.3) | ||||
| (A.4) | ||||
| (A.5) | ||||
| (A.6) |
In particular, the first temporal lifted shadow is the Leggett-Garg tetrahedron attached to the three-time clique [54].
Proof.
The temporal tree-versus-clique divide is therefore now visible. Trees glue automatically after repeated-marginal consistency, but they need not determine a unique global law.
Proposition A.9 (Path completion interval and nonuniqueness).
Fix unit variances on the path and edge correlations . A Gaussian completion exists for every
This interval is nondegenerate whenever and . The distinguished tree-Markov construction selects the centre point .
Proof.
A completion with correlation matrix
exists if and only if . Since the principal minors are positive, this is equivalent to
This is a quadratic inequality in with roots
so the admissible interval is the one stated. Its midpoint is . ∎
Proposition A.10 (Fibre crossing at fixed correlation shadow).
Let have a vertex of degree at least , and let lie in the interior of the correlation-completion set. Then there exist both gluable and non-gluable full edge-law families having the same edge-correlation data .
Proof.
Choose any centred Gaussian completion with unit variances, so each edge block is
and the family is gluable. Now pick a vertex used in at least two edges and choose one incident edge . Replace only the variance of on that edge by a number , and replace the covariance on that edge by . The normalised correlation on that edge remains , and all other edge correlations are untouched, so the edge-correlation shadow is unchanged. But the variance of vertex is now inconsistent across its incident edges, so Proposition A.5 forbids common gluing. ∎
Thus Bell correlators do not exhaust the law-level frontier even before one passes to binary readout inequalities. They are shadows of a fuller pair-law compatibility problem, and the Bell square treated in the main text is the first nonchordal instance of that broader contextual branch.
Appendix B Scalar summaries and Schur-gap diagnostics
This appendix records the minimal scalar diagnostics supporting the Schur-gap discussion in Section 2. No new structure is introduced here.
B.1 Scalar mediation invariants
Let denote the Schur gap from (2.11). The basic scalar diagnostics are
| (B.1) |
They measure total hidden contribution, maximal hidden contribution, and volumetric hidden contribution, respectively.
Proposition B.1 .
The quantities in (B.1) are all nonnegative.
Proof.
Since , its trace and operator norm are nonnegative. Also by (2.11), so monotonicity of the determinant on the positive cone gives , hence . ∎
Remark.
These diagnostics are only summaries. The object itself is the Schur gap operator , and the main text uses the scalar summaries only as numerical readers of hidden contribution.
Appendix C Adjacency, fill-in, and locality diagnostics
This appendix provides the service definitions behind the locality discussion in Section 5. It introduces quotient-induced adjacency and the associated fill-in diagnostics, but it does not add any new locality theorem beyond the main text.
C.1 Fibre-induced visible adjacency
To turn adjacency loss into an intrinsic quotient invariant, the visible mask must be induced by quotient geometry rather than chosen externally.
Definition C.1 (Fibre distance and quotient adjacency).
Let be a quotient of a metric graph or metric state space . Define the lifted fibre distance by
| (C.1) |
If upstairs locality has interaction range , define visible adjacency by
| (C.2) |
Let denote the mask that keeps only matrix entries consistent with (C.2).
Definition C.2 (Locality-defect operator).
Let be a visible precision and let the visible Hilbert structure on be fixed once and for all. The quotient locality-defect operator is
| (C.3) |
Its singular values, stable rank, and retained Frobenius mass are the quotient adjacency-loss diagnostics. These are numerical readers of Schur-complement fill-in and spectral complexity in sparse positive systems [39, 28, 55].
Proposition C.3 (Intrinsic diagnostics).
Relative to a fixed visible Hilbert structure and interaction range , the singular spectrum of and the scalar mediation observables of Appendix B are intrinsic to the quotient construction.
Proof.
Once and are fixed, the mask is determined by the quotient itself. The operator is then determined by and the quotient geometry. The scalar observables of Appendix B depend only on the Schur gap (2.11), which is itself determined by the comparison between quotient observation and naive compression. ∎
Appendix D Renewal / transformed semi-coarse-graining benchmark
This appendix supports the transformed semi-coarse-graining test discussed in Section 10. The point of the benchmark is methodological. It sits just beyond the static quotient theorem domain of the main text, but it still yields a tractable visible law. The source model is the four-state benchmark introduced in the transformed semi-coarse-graining study of entropy-production estimation under partial observation by Kapustin, Ghosal, and Bisker [47]. In spirit it belongs near coarse-graining comparisons such as [56], even though the transformed observer here is renewal-level rather than a static state quotient. What matters here is that the transformed observer is not itself a static quotient of the original continuous-time Markov chain, yet the visible law closes far enough to support a finite completion and a genuine benchmark comparison. For basic finite-state chain notation and path-block bookkeeping we follow standard Markov-chain conventions [57].
D.1 Four-state benchmark and transformed observer
Let the original continuous-time Markov chain have states with hidden block and rates
| (D.1) |
| (D.2) |
Following [47], a transformed semi-coarse-grained trajectory groups each completed run of consecutive visits to the hidden macrostate into a symbol , where is the number of hidden visits in that run and the waiting time of is the sum of the waiting times in those visits. To keep the previous visible state explicit, write
Define
| (D.3) |
Numerically,
Thus the transformed observer is already sharply concentrated on very short hidden excursions.
Proposition D.1 (Exact parity collapse of the transformed sequence law).
For the benchmark (D.1) to (D.3), the countable augmented transformed sequence law on
collapses, at the visible-law level, to a four-symbol second-order parity observer with alphabet
| (D.4) |
where the previous visible state is retained as the second-order memory coordinate and parity records whether the completed hidden run has odd or even length. Equivalently, after unfolding the previous visible state, one obtains a six-symbol first-order Markov representation. More precisely, conditioned on entry from visible state ,
| (D.5) |
and conditioned on entry from visible state ,
| (D.6) |
The next visible state depends on the completed excursion only through the previous visible state and this odd or even parity label.
Proof.
Inside the hidden block the chain alternates between states and until escape to the visible sector. For entry through state the completed excursion exits from hidden state when the number of hidden visits is odd and from hidden state when it is even. The probabilities (D.5) follow by summing the corresponding geometric series. For entry from visible state , the first hidden state is a fixed mixture of and , and summing the odd and even geometric series gives (D.6). Since the visible return law depends only on the hidden exit microstate, it depends only on previous visible state and parity. ∎
The corresponding visible return probabilities are explicit. In particular,
| (D.7) |
and for the -symbols,
| (D.8) |
| (D.9) |
Thus the transformed observer exposes the hidden mode as an almost visible parity channel.
Theorem D.2 (Two-kernel timing collapse).
Let
Then the waiting-time transforms of the parity symbols lie exactly in the two-dimensional span generated by
| (D.10) |
More precisely,
| (D.11) |
| (D.12) |
while
| (D.13) |
All four transforms therefore share the same quadratic denominator
| (D.14) |
Proof.
The odd and even transforms for entry through state are summed geometric series in the product , which gives (D.10). Entry through state either exits immediately through or first moves to , which yields (D.11). The -symbol transforms are then the conditional mixtures induced by the two possible hidden entry microstates, giving (D.12) and (D.13). The common denominator is immediate from (D.10). ∎
Theorem D.2 shows that the hidden timing sector of the transformed observer is not an uncontrolled memory tower. It is exactly two-dimensional at the visible-law level.
Proposition D.3 (Exact finite completion).
The parity-lifted transformed observer admits an explicit finite CTMC completion. One such completion has visible states together with four hidden phase blocks: a two-state block for , a two-state block for , a four-state block for , and a four-state block for . The two basic hidden excursion generators are
| (D.15) |
| (D.16) |
and the -blocks are direct sums of these two generators with the conditional odd or even entry weights. Hence an finite completion exists with total state count .
Proof.
The parity transforms in Theorem D.2 are rational phase-type laws of order at most two [58]. The -symbols require one conditioned two-state excursion block each. The -symbols are conditional mixtures over the two possible hidden entry microstates, so each is realised exactly by the corresponding direct-sum block. Adding the visible states gives states. ∎
Remark (One exact completion and the renewal frontier).
The transformed semi-coarse-graining benchmark works for a structural reason, not because of an accidental good observer choice. In the 4-state benchmark, the hidden 2-state block alternates deterministically, so the transformed sequence law depends only on the parity of the hidden run length, not on the full run length. Proposition D.1 therefore gives a finite parity collapse in the sequence channel. The timing channel also closes: by Theorem D.2, the parity-symbol waiting-time transforms lie in a two-dimensional phase-type span and share a common quadratic denominator, so the transformed timing sector is not an uncontrolled memory tower. Together these two facts show that the transformed visible law is already finite in disguise. The explicit 14-state CTMC construction is therefore not an ad hoc completion but a realisation of an intrinsically finite parity-lifted semi-Markov visible law.
On the explicit 14-state completion from Proposition D.3, the transformed observer has active visible tangent rank and hidden-load rank at the visible stalling point. Numerically,
By contrast, the original full-CG observer on the 4-state chain is only two-dimensional and is already a one-hard-direction quotient observer, with hidden-load spectrum approximately at stall. This sharpens the true open problem: not whether one finite completion exists, but whether the completion-independent tangent ceiling and hidden-load structure can be fixed directly from the renewal visible law itself rather than from a chosen finite completion. This is the natural extension frontier beyond the static quotient geometry proved in the main text.
Appendix E Blind benchmark diagnostics
This appendix records the auxiliary diagnostics behind the lock-then-reveal benchmark discussed in Section 11. They are included to document how the protocol behaved under finite observation and adaptive reveal, not to enlarge the theorem domain of the paper.
E.1 Exact-ensemble finite-error spread
On the 256-world ensemble, the retained-signal and detectability diagnostics show a nontrivial but controlled finite-error spread across worlds. The important methodological point is not that every world is reconstructed with the same accuracy, but that the ensemble error distribution remains concentrated enough for the finite tangent law to function as an operational discriminator at the level reported in the main text. This is the diagnostic content that underlay the ensemble error histograms in the archive.
E.2 Adaptive reveal as a diagnostic frontier
The adaptive-reveal experiment was run as a secondary check on whether theorem-targeted observation can improve the operational signal. On the 64-world diagnostic panel, the oracle theorem-target reveal improved the mean second-step revealed signal relative to the random baseline. The same comparison in the normalised detectability score was again positive, but smaller. This is why Section 11 treats adaptive reveal as a diagnostic frontier rather than as a new theorem-bearing claim: the gain is real, but it belongs to the protocol layer, not to the intrinsic quotient-visible law.
E.3 Exact versus sampled Bell verdicts
The Bell-facing part of the blind benchmark was evaluated in both law-level and sampled modes. On the recorded hero families, law-level verdict recovery cleanly identified the glueable versus non-glueable cases at the law level. The sampled mode was materially weaker and missed the glueable families on the recorded benchmark, which is why the paper treats the Bell verdict as a law-level statement and uses the sampled track only as a robustness layer. This is the boundary that matters for interpretation: the lock-then-reveal protocol works as a test of the law-level compatibility machinery, but not yet as a theorem-safe sampled Bell pipeline.
Appendix F Methodological bridges and limits of the positive-survivor programme
This appendix retains one methodological bridge only, namely the distinction between structural and practical identifiability. Its role is to support the transfer boundary stated in Section 12: neighbouring hidden-to-visible problems can exhibit the same survivor logic without thereby falling inside the theorem domain of the present paper. What is claimed here is limited and explicit. A regular structural quotient carries the descended Fisher form, enlarging the admissible experiment class sharpens that quotient, and the hidden-load geometry from the main text gives a finite-dimensional instance of the same split. What is not claimed is a universal theorem unifying all hidden-to-visible reductions.
F.1 Bridge A: structural versus practical identifiability
Let be a smooth parameter manifold, let be an admissible experiment class, and for each let
be the observational law. Define structural equivalence relative to by
Assume that near a regular point the equivalence classes form a smooth quotient manifold
For a fixed experiment , let denote the Fisher information bilinear form on .
Theorem F.1 .
Under the regular quotient hypothesis, each experiment factors uniquely through the quotient: there exists a reduced statistical model
such that
Moreover:
-
1.
for every vertical vector , the score annihilates,
-
2.
the Fisher form vanishes on vertical directions and descends uniquely to a bilinear form on satisfying
-
3.
structural nonidentifiability is the vertical degeneracy of , while practical nonidentifiability for a given experiment is degeneracy or strong anisotropy of the descended form on the quotient tangent.
Proof.
By definition, each is constant on every structural fibre, so it depends only on ; this gives the unique reduced model. Differentiating the factorisation along a vertical vector gives the score annihilation. The Fisher identity then shows that , so depends only on quotient tangent classes and therefore descends uniquely to . ∎
The theorem is local rather than global. It says that the correct canonical object is not a matrix written in some auxiliary horizontal complement, but the descended bilinear form on the structural quotient itself. A direct consequence is that enlarging the admissible experiment class can only refine the quotient and remove vertical directions; it cannot create a new structural fibre.
Proposition F.2 .
Let be two experiment classes, and assume both regular quotients exist near the point of interest:
Then there exists a unique local surjection such that
For every experiment , the descended Fisher forms satisfy the pullback relation
Hence enlarging the experiment class can only sharpen the quotient geometry.
Proof.
If two parameters are equivalent for the larger class , they are equivalent for the smaller class . Therefore every -class sits inside a -class, which induces the unique local map with . The Fisher pullback identity then follows from Theorem F.1 applied to the factorisation of the statistical model through the two quotients. ∎
A canonical toy model is the scalar decay law
with parameters . The full observational law depends only on and , so the structural fibres are
The quotient is therefore two-dimensional with coordinates , and the quotient Fisher form is the Fisher matrix of the reduced mean model . This shows in one line that a direction can be structurally invisible upstairs while the remaining quotient directions are still experiment-dependent in visibility.
In the present quotient setting this split becomes finite-dimensional rather than merely local.
Theorem F.3 (Exact inverse split for the hidden-load class).
Let and let . Let be a visible law in the support-preserving interior beneath , so that by Theorem 4.4
Then:
-
(i)
conditional on the tangent ceiling , the hidden-load operator is uniquely identified by and equals
(F.1) moreover,
-
(ii)
without an independently fixed ceiling, alone does not identify a unique hidden load: for every with , there exists a unique on such that
Hence determines a full ceiling cone of compatible ceiling-load explanations.
Proof.
Part (i) is the explicit recovery formula already built into Theorem 4.4. The rank and determinant identities are Corollary 4.7.
For part (ii), fix on the same support and define by the displayed formula. Then
Since inversion reverses Loewner order on positive definite operators,
so . Rearranging gives the stated representation of , and uniqueness follows because . ∎
Combined with Corollary 4.5, this gives the order reversal at fixed ceiling:
It also gives the zero-load boundary .
Proposition F.4 (Gram rigidity and hidden-factor gauge).
Fix and and let be the uniquely identified hidden-load operator from Theorem F.3. Write . Then every minimal hidden realisation is a Gram factorisation
and if both have full column rank and satisfy , then
for some orthogonal matrix . Consequently identifies the hidden Gram operator and its intrinsic invariants, but not a unique hidden basis, hidden factorisation, or hidden sparsity pattern.
Proof.
The existence of a minimal factorisation follows from Theorem 4.6. Assume with both factors of column rank , and define
Because , one has
Moreover,
Since is an matrix, implies . Hence . ∎
References
- M. D. Donsker and S. R. S. Varadhan [1975a] M. D. Donsker and S. R. S. Varadhan. Asymptotic evaluation of certain Markov process expectations for large time. I, 1975a. Communications on Pure and Applied Mathematics, 28:1-47, 1975.
- M. D. Donsker and S. R. S. Varadhan [1975b] M. D. Donsker and S. R. S. Varadhan. Asymptotic evaluation of certain Markov process expectations for large time. II, 1975b. Communications on Pure and Applied Mathematics, 28:279-301, 1975.
- M. D. Donsker and S. R. S. Varadhan [1976] M. D. Donsker and S. R. S. Varadhan. Asymptotic evaluation of certain Markov process expectations for large time. III, 1976. Communications on Pure and Applied Mathematics, 29(4):389-461, 1976.
- R. S. Ellis [2006] R. S. Ellis. Entropy, Large Deviations, and Statistical Mechanics, 2006. Grundlehren der mathematischen Wissenschaften, Vol. 271, Springer, 1985. Reprinted as Classics in Mathematics, 2006.
- H. Touchette [2009] H. Touchette. The large deviation approach to statistical mechanics, 2009. Physics Reports, 478:1-69, 2009.
- L. Bertini et al. [2015] L. Bertini, A. Faggionato, and D. Gabrielli. Large deviations of the empirical flow for continuous time Markov chains, 2015. Annales de l’I.H.P. Probabilités et Statistiques, 51(3):867-900, 2015.
- J. R. Dunkley [2026] J. R. Dunkley. Finite Observation: A Spectral Theory of Nonequilibrium Visibility, 2026. Preprint, 2026.
- J. Schnakenberg [1976] J. Schnakenberg. Network theory of microscopic and macroscopic behavior of master equation systems, 1976. Reviews of Modern Physics, 48:571-585, 1976.
- J. L. Lebowitz and H. Spohn [1999] J. L. Lebowitz and H. Spohn. A Gallavotti-Cohen-type symmetry in the large deviation functional for stochastic dynamics, 1999. Journal of Statistical Physics, 95:333-365, 1999.
- U. Seifert [2012] U. Seifert. Stochastic thermodynamics, fluctuation theorems and molecular machines, 2012. Reports on Progress in Physics, 75:126001, 2012.
- M. Esposito [2012] M. Esposito. Stochastic thermodynamics under coarse graining, 2012. Physical Review E, 85:041125, 2012.
- C. Maes [2020] C. Maes. Frenesy: time-symmetric dynamical activity in nonequilibria, 2020. Physics Reports, 850:1-33, 2020.
- I. Schur [1917] I. Schur. Über Potenzreihen, die im Innern des Einheitskreises beschränkt sind, 1917. Journal für die reine und angewandte Mathematik, 147:205-232, 1917.
- W. N. Anderson and Jr [1971] W. N. Anderson and Jr. Shorted operators, 1971. SIAM Journal on Applied Mathematics, 20(3):520-525, 1971.
- W. N. Anderson, Jr. and R. J. Duffin [1969] W. N. Anderson, Jr. and R. J. Duffin. Series and parallel addition of matrices, 1969. Journal of Mathematical Analysis and Applications, 26(3):576-594, 1969.
- W. N. Anderson, Jr. and G. E. Trapp [1975] W. N. Anderson, Jr. and G. E. Trapp. Shorted operators. II, 1975. SIAM Journal on Applied Mathematics, 28(1):60-71, 1975.
- R. Bhatia [2007] R. Bhatia. Positive Definite Matrices, 2007. Princeton University Press, 2007.
- K. Löwner [1934] K. Löwner. Über monotone Matrixfunktionen, 1934. Mathematische Zeitschrift, 38:177-216, 1934.
- T. Ando [1979] T. Ando. Concavity of certain maps on positive definite matrices and applications to Hadamard products, 1979. Linear Algebra and Its Applications, 26:203-241, 1979.
- F. Hansen and G. K. Pedersen [1982] F. Hansen and G. K. Pedersen. Jensen’s inequality for operators and Löwner’s theorem, 1982. Mathematische Annalen, 258(3):229-241, 1982.
- R. Bhatia [1997] R. Bhatia. Matrix Analysis, 1997. Graduate Texts in Mathematics, Vol. 169, Springer, 1997.
- F. Kubo and T. Ando [1980] F. Kubo and T. Ando. Means of positive linear operators, 1980. Mathematische Annalen, 246:205-224, 1980.
- W. Pusz and S. L. Woronowicz [1975] W. Pusz and S. L. Woronowicz. Functional calculus for sesquilinear forms and the purification map, 1975. Reports on Mathematical Physics, 8(2):159-170, 1975.
- L. P. Kadanoff [1966] L. P. Kadanoff. Scaling laws for Ising models near , 1966. Physics Physique Fizika, 2:263-272, 1966.
- K. G. Wilson and J. Kogut [1974] K. G. Wilson and J. Kogut. The renormalization group and the expansion, 1974. Physics Reports, 12(2):75-200, 1974.
- J. Polchinski [1984] J. Polchinski. Renormalization and effective Lagrangians, 1984. Nuclear Physics B, 231(2):269-295, 1984.
- K. Fan [1951] K. Fan. Maximum properties and inequalities for the eigenvalues of completely continuous operators, 1951. Proceedings of the National Academy of Sciences, 37:760-766, 1951.
- R. A. Horn and C. R. Johnson [2013] R. A. Horn and C. R. Johnson. Matrix Analysis, 2013. Cambridge University Press, second edition, 2013.
- F. Zhang and editor [2005] F. Zhang and editor. The Schur Complement and Its Applications, 2005. Springer, New York, 2005.
- E. V. Haynsworth [1968] E. V. Haynsworth. On the Schur complement, 1968. Basel Mathematical Notes, BMN 20, 1968.
- D. Carlson et al. [1974] D. Carlson, E. Haynsworth, and T. Markham. A generalization of the Schur complement by means of the Moore-Penrose inverse, 1974. SIAM Journal on Applied Mathematics, 26(1):169-175, 1974.
- E. B. Bogomol’nyi [1976] E. B. Bogomol’nyi. Stability of classical solutions, 1976. Soviet Journal of Nuclear Physics, 24(4):449-454, 1976.
- A. P. Dempster [1972] A. P. Dempster. Covariance selection, 1972. Biometrics, 28:157-175, 1972.
- S. L. Lauritzen [1996] S. L. Lauritzen. Graphical Models, 1996. Oxford Statistical Science Series, No. 17, Oxford University Press, 1996.
- V. Chandrasekaran et al. [2012] V. Chandrasekaran, P. A. Parrilo, and A. S. Willsky. Latent variable graphical model selection via convex optimization, 2012. The Annals of Statistics, 40(4):1935-1967, 2012.
- R. Grone et al. [1984] R. Grone, C. R. Johnson, E. M. Sá, and H. Wolkowicz. Positive definite completions of partial Hermitian matrices, 1984. Linear Algebra and Its Applications, 58:109-124, 1984.
- J. Williamson [1936] J. Williamson. On the algebraic problem concerning the normal forms of linear dynamical systems, 1936. American Journal of Mathematics, 58(1):141-163, 1936.
- R. A. Horn and C. R. Johnson [1991] R. A. Horn and C. R. Johnson. Topics in Matrix Analysis, 1991. Cambridge University Press, 1991.
- A. George and J. W. H. Liu [1981] A. George and J. W. H. Liu. Computer Solution of Large Sparse Positive Definite Systems, 1981. Prentice-Hall, Englewood Cliffs, NJ, 1981.
- P. G. Doyle and J. L. Snell [1984] P. G. Doyle and J. L. Snell. Random Walks and Electric Networks, 1984. Carus Mathematical Monographs, Vol. 22, Mathematical Association of America, 1984.
- D. M. Malioutov et al. [2006] D. M. Malioutov, J. K. Johnson, and A. S. Willsky. Walk-sums and belief propagation in Gaussian graphical models, 2006. Journal of Machine Learning Research, 7:2031-2064, 2006.
- S. Demko et al. [1984] S. Demko, W. F. Moss, and P. W. Smith. Decay rates for inverses of band matrices, 1984. Mathematics of Computation, 43(168):491-499, 1984.
- M. Benzi and G. H. Golub [1999] M. Benzi and G. H. Golub. Bounds for the entries of matrix functions with applications to preconditioning, 1999. BIT Numerical Mathematics, 39(3):417-438, 1999.
- M. Benzi and N. Razouk [2007] M. Benzi and N. Razouk. Decay bounds and O(n) algorithms for approximating functions of sparse matrices, 2007. Electronic Transactions on Numerical Analysis, 28:16-39, 2007.
- T. J. Rivlin [1990] T. J. Rivlin. Chebyshev Polynomials: From Approximation Theory to Algebra and Number Theory, 1990. Wiley, 1974; second edition, 1990.
- L. N. Trefethen [2013] L. N. Trefethen. Approximation Theory and Approximation Practice, 2013. SIAM, Philadelphia, 2013.
- U. Kapustin et al. [2024] U. Kapustin, A. Ghosal, and G. Bisker. Utilizing time-series measurements for entropy-production estimation in partially observed systems, 2024. Physical Review Research, 6:023039, 2024.
- Liepelt and Lipowsky [2007] A. D. Liepelt and R. Lipowsky. Kinesin’s network of chemomechanical motor cycles. Physical Review Letters, 98(25):258102, 2007.
- Banerjee et al. [2017] S. Banerjee, A. B. Kolomeisky, and O. A. Igoshin. Elucidating interplay of speed and accuracy in biological error correction, 2017. Proceedings of the National Academy of Sciences, 114(20):5183-5188, 2017.
- C. R. Rao [1945] C. R. Rao. Information and accuracy attainable in the estimation of statistical parameters, 1945. Bulletin of the Calcutta Mathematical Society, 37:81-91, 1945.
- S. Amari and H. Nagaoka [2000] S. Amari and H. Nagaoka. Methods of Information Geometry, 2000. Translations of Mathematical Monographs, Vol. 191, American Mathematical Society, 2000.
- N. Ay et al. [2017] N. Ay, J. Jost, H. V. Lê, and L. Schwachhöfer. Information Geometry, 2017. Ergebnisse der Mathematik und ihrer Grenzgebiete, Vol. 64, Springer, 2017.
- [53] A. Fine. Hidden variables, joint probability, and the Bell inequalities. Journal of Mathematical Physics, 23(7):1306-1310, 1982.
- [54] A. J. Leggett and A. Garg. Quantum mechanics versus macroscopic realism: is the flux there when nobody looks? Physical Review Letters, 54(9):857-860, 1985.
- M. Rudelson and R. Vershynin [2007] M. Rudelson and R. Vershynin. Sampling from large matrices: an approach through geometric functional analysis, 2007. Journal of the ACM, 54(4), Article 21, 2007.
- G. Teza and A. L. Stella [2020] G. Teza and A. L. Stella. Exact coarse graining preserves entropy production out of equilibrium, 2020. Physical Review Letters, 125:110601, 2020.
- J. G. Kemeny and J. L. Snell [1960] J. G. Kemeny and J. L. Snell. Finite Markov Chains, 1960. Springer-Verlag, 1976. Originally published by D. Van Nostrand, 1960.
- P. Buchholz [1994] P. Buchholz. Exact and ordinary lumpability in finite Markov chains, 1994. Journal of Applied Probability, 31:59-75, 1994.