To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter gives various applications of the theory developed in the previous chapters. The first application is a proof of generation of mouse full pointclasses assuming Strong Mouse Capturing. The second application is a proof that Strong Mouse Capturing holds in the minimal model of LSA; so the Mouse Set Conjecture is true in all models of AD^+ up to the minimal model of LSA. The third application is a proof of consistency of LSA from the existence of a Woodin limit of Woodin cardinals.
The main purpose of this chapter is to isolate the definition of short tree strategy mice. The main problem with defining this concept is the fact that it is possible that maximal iteration trees (which should not have branches indexed in the strategy predicate) may core down to short iteration trees (which must have branches indexed in the strategy predicate), thus causing indexing issues. To resolve this issue we will design an authentication procedure which will carefully choose iteration trees and index their branches. Thus, if some iteration tree doesn’t have a branch indexed in the strategy predicate then it is because the authentication procedure hasn’t yet found an authenticated branch, and therefore, such iteration trees cannot core down to an iteration tree whose branch is authenticated.
This chapter introduces the main concepts and the problems to be investigated by the book. In particular, the chapter defines the Largest Suslin Axiom (LSA) and the minimal model of LSA. The chapter summarizes the main theorems to be proved in the book: HOD of the minimal model of LSA satisfies the Generalized Continuum Hypothesis, the Mouse Set Conjecture holds in the minimal model of LSA, the consistency of LSA from large cardinals, the consistency of LSA from strong forcing axioms like PFA.
The main goal of this chapter is to prepare some terminology to be used in the rest of the book. One important notion introduced in this chapter is that of the undropping game. We will use it to prove a comparison theorem for hod mice in Chapter 4.
This chapter studies internal theory of lsa hod mice. Suppose $(\mathcal{P},\Sigma)$ is a hod pair of an sts hod pair, $X$ is a self-wellordered set such that $\mathcal{P}\in X$, and $\mathcal{N}$ is a $\Sigma$ or $\Sigma$-sts mouse over $X$. The main theorem of this chapter shows that N is $\Sigma$-closed and has fullness preserving iteration strategy, then $\Sigma \restriction \mathcal{N}[g]$ is definable in $\mathcal{N}[g]$ for any generic $g$ over $\mathcal{N}$ . The main idea behind the proof is that the branch of an iteration tree $\mathcal{T}$ on $\mathcal{P}$ can be identified by the authentication process introduced in Chapter 3.