Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Recursion-Theoretic Alternation

  • Conference paper
  • First Online:
Twenty Years of Theoretical and Practical Synergies (CiE 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14773))

Included in the following conference series:

  • 67 Accesses

Abstract

We introduce four recursion schemes, which, operating on a tree-like data structure, capture different models of computation based on alternating bounded quantifiers. By encoding inputs as paths, we recover and expand characterizations of complexity classes between deterministic linear time and polynomial space; by encoding them as balanced trees, we recover characterizations of alternating logarithmic time and polylogarithmic space.

We propose recursion-theoretic characterizations of logarithmic and polylogarithmic time, as defined via Turing machines with random access to the input, and show that the classes of functions obtained capture, at least, the desired classes, and, at most, their alternating versions.

Should the proposed characterizations be precise, we show that characterizations of linear and polynomially bounded alternating classes can be adapted to alternating classes with logarithmic and polylogarithmic resource bounds, simply by changing the way in which inputs are encoded. We discuss how, from these characterizations, some open problems in complexity theory can be obtained from known results by making alterations to recursion schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Lemmas 1 and 2.

  2. 2.

    This idea can be formalized quite elegantly through term rewriting systems.

  3. 3.

    For example, recursion over \((0*1)*(0*0)\) will take two recursive steps, whereas over \(0*1*0*0\) it will take three, even though both inputs have the same length.

  4. 4.

    \(\texttt {qAC}^0\) is the class of languages recognizable by circuit families of constant depth and (quasi-polynomial) size \(2^{\log (n)^{\mathcal {O}(1)}}\).

  5. 5.

    Bel’tyukov characterizes the rudimentary predicates [25], which coincide with LINH [26].

  6. 6.

    For example, suppose that 01 is written on the query tape to recover the 1st digit in the word 0100 (recall that we start the count at 0). The 0 indicates that the symbol is on the left half of the word and the 1 that it is on the right half of the subtree obtained.

References

  1. Barrington, D.A.M.: Quasipolynomial size circuit classes. In: 1992 Seventh Annual Structure in Complexity Theory Conference, pp. 86–87. IEEE Computer Society (1992)

    Google Scholar 

  2. Barrington, D.A.M., Immerman, N., Straubing, H.: On uniformity within NC\({}^1\). J. Comput. Syst. Sci. 41(3), 274–306 (1990)

    Article  MathSciNet  Google Scholar 

  3. Bellantoni, S., Cook, S.: A new recursion-theoretic characterization of the polytime functions. In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, pp. 283–293 (1992)

    Google Scholar 

  4. Bellantoni, S., Oitavem, I.: Separating NC along the \(\delta \) axis. Theor. Comput. Sci. 318(1–2), 57–78 (2004)

    Article  MathSciNet  Google Scholar 

  5. Bel’tyukov, A.P.: A machine description and the hierarchy of initial Grzegorczyk classes. J. Sov. Math. 20, 2280–2289 (1982)

    Article  Google Scholar 

  6. Bloch, S.: Alternating function classes within P. Technical report, University of Manitoba Computer Science Department (1992)

    Google Scholar 

  7. Bloch, S.: Functional characterizations of uniform log-depth and polylog-depth circuit families. In: Computational Complexity Conference, pp. 193–206. Citeseer (1992)

    Google Scholar 

  8. Buss, S.R.: The graph of multiplication is equivalent to counting. Inf. Process. Lett. 41(4), 199–201 (1992)

    Article  MathSciNet  Google Scholar 

  9. Chandra, A.K., Kozen, D.C., Stockmeyer, L.J.: Alternation. J. ACM 28(1), 114–133 (1981)

    Article  MathSciNet  Google Scholar 

  10. Clote, P.: Sequential, machine-independent characterizations of the parallel complexity classes AlogTIME, \(AC^k\), \(NC^k\) and NC, pp. 49–69. Birkhäuser Boston, Boston, MA (1990)

    Google Scholar 

  11. Clote, P.: Nondeterministic stack register machines. Theor. Comput. Sci. 178(1–2), 37–76 (1997)

    Article  MathSciNet  Google Scholar 

  12. Clote, P.: Computation models and function algebras. In: Studies in Logic and the Foundations of Mathematics, vol. 140, pp. 589–681. Elsevier (1999)

    Google Scholar 

  13. Ferrarotti, F., González, S., Schewe, K.-D., Turull-Torres, J.M.: Proper hierarchies in polylogarithmic time and absence of complete problems. In: Herzig, A., Kontinen, J. (eds.) FoIKS 2020. LNCS, vol. 12012, pp. 90–105. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39951-1_6

    Chapter  Google Scholar 

  14. Ferrarotti, F., González, S., Schewe, K.D., Turull-Torres, J.M.: The polylog-time hierarchy captured by restricted second-order logic. In: 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 133–140. IEEE (2018)

    Google Scholar 

  15. Ferrarotti, F., González, S., Torres, J.M.T., Van den Bussche, J., Virtema, J.: Descriptive complexity of deterministic polylogarithmic time and space. J. Comput. Syst. Sci. 119, 145–163 (2021)

    Article  MathSciNet  Google Scholar 

  16. Leivant, D.: A foundational delineation of computational feasibility. In: Proceedings 1991 Sixth Annual IEEE Symposium on Logic in Computer Science, pp. 2–11. IEEE Computer Society (1991)

    Google Scholar 

  17. Leivant, D.: A characterization of NC by tree recurrence. In: Proceedings 39th Annual Symposium on Foundations of Computer Science, pp. 716–724. IEEE (1998)

    Google Scholar 

  18. Oitavem, I.: Characterizing PSPACE with pointers. Math. Log. Q. 54(3), 323–329 (2008)

    Article  MathSciNet  Google Scholar 

  19. Oitavem, I.: A recursion-theoretic approach to NP. Ann. Pure Appl. Log. 162(8), 661–666 (2011)

    Article  MathSciNet  Google Scholar 

  20. Oitavem, I.: The polynomial hierarchy of functions and its levels. Theor. Comput. Sci. 900, 25–34 (2022)

    Article  MathSciNet  Google Scholar 

  21. Paul, W.J., Pippenger, N., Szemeredi, E., Trotter, W.T.: On determinism versus non-determinism and related problems. In: 24th Annual Symposium on Foundations of Computer Science (SFCS 1983), pp. 429–438 (1983)

    Google Scholar 

  22. Regan, K.W., Vollmer, H.: Gap-languages and log-time complexity classes. Theor. Comput. Sci. 188(1), 101–116 (1997)

    Article  MathSciNet  Google Scholar 

  23. Simmons, H.: The realm of primitive recursion. Arch. Math. Log. 27(2), 177–188 (1988)

    Article  MathSciNet  Google Scholar 

  24. Sipser, M.: Borel sets and circuit complexity. In: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, pp. 61–69 (1983)

    Google Scholar 

  25. Smullyan, R.M.: Theory of Formal Systems. Princeton University Press, Princeton (1961)

    Google Scholar 

  26. Wrathall, C.: Rudimentary predicates and relative computation. SIAM J. Comput. 7(2), 194–209 (1978)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was funded by national funds through the FCT – Fundação para a Ciência e a Tecnologia, I.P., under the scope of the projects UIDB/00297/2020 (https://doi.org/10.54499/UIDB/00297/2020) and UIDP/00297/2020 (https://doi.org/10.54499/UIDP/00297/2020) (Center for Mathematics and Applications) and the FCT scholarship, reference 2022.10596.BD.

I am grateful to Isabel Oitavem for many helpful comments and to the anonymous referees for their suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eduardo Skapinakis .

Editor information

Editors and Affiliations

Ethics declarations

Disclosure of Interests

The author has no competing interests to declare that are relevant to the content of this article.

Appendix

Appendix

We have used the work of Bloch, in [6], to justify the lower bound for our characterization of LIN (Theorem 1), and in [7], to justify the upper bound for our characterization of ALOG and POLYLOGSPACE. In this Appendix, we discuss the relationship between our setting and his, to facilitate the comparison between the two perspectives.

Regarding LIN, all the base functions in Definition 7 of [6] have a corresponding function in our Definition 1, when inputs are encoded as paths. For example, the function Half\((;x) = \lfloor \frac{x}{2}\rfloor \) there corresponds to our L, when inputs are encoded as paths. The difference then is that Bloch uses simultaneous recursion instead of our regular recursion scheme. However, since we have \(*\), L and R as initial functions, we can replace a system of equations defining \(f_1,\dots ,f_k\) by a single recursion scheme, defining \(f = f_1*\dots *f_k\) with a step function which uses L and R to extract each \(f_i\) from \(f_1*\dots *f_k\), applies to it its respective step function, and encodes the result again.

Regarding ALOG and POLYLOGSPACE, rewriting from our tree-like data structure to binary inputs, all the functions from our Definition 1 are in the base class of [7] (Definition 1 there). For example, when inputs are encoded as balanced trees, our \(*\) corresponds to the concatenation function and our \(\textsf{L}\) and \(\textsf{R}\) to the “front half” and “back half” functions. Definitions 6 and 7 of [7] contain the schemes of safe and very safe divide and conquer recursion, which allow a function to call itself on the back and front halves of the input word. In our data structure, this corresponds to, without a path parameter, allowing a function on input \(u*v\) to call itself on input u and v, which generalizes our path-recursion schemes, where the function has to choose which path to follow. This means that, when inputs are encoded as balanced trees, our schemes pSR and vpSR can be simulated by the respective safe and very safe forms of divide and conquer recursion. Thus, our classes \([\mathcal {I};\textsf{SC},\textsf{vpSR}]\) and \([\mathcal {I};\textsf{SC},\textsf{pSR}]\) characterize, at most, ALOG and APOLYLOG, respectively (Theorems 14 and 24 of [7]). As AR introduces only the power of alternation in a class (see Theorem 4), and ALOG and APOLYLOG are already alternating classes, we get that \([\mathcal {I};\textsf{SC},\textsf{vpSR},\textsf{AR}]\) and \([\mathcal {I};\textsf{SC},\textsf{pSR},\textsf{AR}]\) also characterize, at most, ALOG and APOLYLOG, respectively, which is the desired upper bound.

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Skapinakis, E. (2024). Recursion-Theoretic Alternation. In: Levy Patey, L., Pimentel, E., Galeotti, L., Manea, F. (eds) Twenty Years of Theoretical and Practical Synergies. CiE 2024. Lecture Notes in Computer Science, vol 14773. Springer, Cham. https://doi.org/10.1007/978-3-031-64309-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-64309-5_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-64308-8

  • Online ISBN: 978-3-031-64309-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics