Rudimentary Reductions Revisited 1 Introduction

Total Page:16

File Type:pdf, Size:1020Kb

Rudimentary Reductions Revisited 1 Introduction Rudimentary reductions revisited y Vivek Gore Eric Allender Department of Computer Science Department of Computer Science Rutgers University Rutgers University New Brunswick, NJ 08903 New Brunswick, NJ 08903 April 23, 1997 Abstract: We show that log-b ounded rudimentary reductions de ned and studied by Jones in 0 1975 characterize Dlogtime-uniform AC . 1 Intro duction In the rst part of the oft-cited pap er [Jon75], Jones intro duced logspace reductions as a to ol for study- ing the relative complexity of problems in P. In the second part of [Jon75], Jones intro duced a re- stricted version of logspace reducibility, called log-b ounded rudimentary reductions. The motivation for intro ducing this restriction came from 1 the desire to have a to ol for talking ab out the structure of very small complexity classes such as DSPACElog n, and 2 interest in generalizing the notion of \rudimentary relations," which at that time was the ob ject of a considerable amount of attention [Smu61, Sal73,Wra78, Wil79, PD80]. In [Jon75], Jones went on to showthatanumb er of problems were complete for various complexity classes under log-b ounded rudimentary reductions. Although logspace reducibility has proved to b e a very useful notion in complexity theory in the intervening years, log-b ounded rudimentary reducibility has b een mentioned explicitly only seldom in subsequentwork { although, as we demonstrate, it has b een considered implicitly many times, under di erent names. A great deal of insight ab out the complexityofvarious problems has b een gained by the study of uniform circuit complexity; many complexity classes have b een characterized in terms of the compu- tational p ower of families of circuits fC : n 2 Ng where C takes inputs of length n, byvarying n n the typ es of gates and allowable fan-in on the circuits, and imp osing a \uniformity condition" which sp eci es that the de nition of C in terms of n b e \easy" in some sense. Unfortunately, the question of n Supp orted in part by NSF grant CCR-9000045. y Supp orted in part by a DIMACS research assistantship. DIMACS is a co op erative pro ject of Rutgers University, Princeton University,AT&T Bell Lab oratories and Bellcore. DIMACS is an NSF Science and Technology Center, funded under contract STC-88-09648; and also receives supp ort from the New Jersey Commission on Science and Technology. 1 which uniformity condition to use has remained somewhat controversial. For example, although much work on uniform circuit complexity uses logspace uniformity, it is not clear that this is appropriate when 0 de ning sub classes of DSPACElog n, suchasAC , the class of languages accepted by p olynomial-size, constant-depth circuits of unb ounded fan-in AND and OR gates. 0 Comp eting de nitions of \uniform AC "were prop osed by Immerman [Imm87, Imm89] and Buss [Bus87]. Then it was shown by Barrington, Immerman, and Straubing, that these de nitions in fact 0 coincide [BIS90]; they show that Dlogtime-uniform AC may b e de ned alternatively in terms of rst- order logic, O 1 time on a CRAM, inductive de nitions with O 1 inductive depth, and Sipser's log-time 0 hierarchy [Sip83]. Other characterizations of Dlogtime-uniform AC are found in [Clo90]. Since some of these notions were de ned entirely indep endently of each other and indep endently of considerations of uniform circuit complexity, the fact that these notions coincide is taken as evidence for the \correctness" 0 of the Dlogtime-uniformity condition when cho osing a de nition of uniform AC . In this pap er, we add to this b o dy of evidence by showing that Jones' logspace rudimentary reductions 0 provide yet another characterization of Dlogtime-uniform AC . Throughout the rest of this pap er, 0 0 all references to AC will denote Dlogtime-uniformAC . 2 Preliminaries De nition1 The following de nitions are due to Jones [Jon75]. th Let b e an alphab et. The ternary predicate x; i; a is true i a is the i symbol of x where x 2 . For a p ositiveinteger c and a space b ound S , de ne the predicates P , P as follows: c;S c;S P x; u; v ; w , uv 6= w ^juv w jc S jxj. P x; u; v ; w , uv = w ^juv w j c S jxj, c;S c;S The class of S -b ounded rudimentary predicates, RUD is the class of predicates built from S P for every c via logical connectives, explicit transformations, and S -b ounded ; :;P , and c;S c;S existential and universal quanti cation. See [Jon75] for a complete de nition. De nition2 A function f : ! is S -b ounded rudimentary i the predicate R de ned by Rx; i; a , f x;i;aisinRUD . S th That is, f is S -b ounded rudimentary i the predicate \a is the i symbol of f x" is in RUD . The S cS jxj fact that jij c S jxj for some c and all x implies that jf xj2 . Note that, as de ned ab ove, RUD is a set of predicates;however we can just as easily view RUD as S S a set of languages. A language L will b e said to b e in RUD i the characteristic function of L is S - S b ounded rudimentary. Alternatively, each predicate Q 2 RUD over alphab et de nes a language L S 2 over alphab et [f; g where \," is any symb ol not in de ned by L = fx; y ;:::;y : Qx; y ;:::;y g. 1 m 1 m These alternative de nitions are easily seen to b e equivalent. For more formal arguments along these lines, see [Wra78]. In this pap er as in [Jon75] we are interested primarily in RUD , the class obtained when the space log 0 b ound S is logarithmic. In Section 3, we show that RUD =AC . log The pro ofs in this pap er will not make use of the circuit formalism;thus detailed de nitions of the Dlogtime-uniformity conditions are omitted here. They may b e found in [BIS90, BCGR90]. Instead, 0 we will use twocharacterizations of AC that were shown to b e equivalent in [BIS90] see also [BCGR90], one in terms of alternating Turing machines, and one in terms of rst-order logic. We use the mo del of alternating Turing machine used by Ruzzo [Ruz81] in which access to the input is provided via a sp ecial tap e whichwe call the input address tape onto which an address i maybe th written in binary, following which in unit time the i input symbol is available. This convention is necessary to allow machines with sublinear running times to have access to all of the input. Consult [BIS90, BCGR90] for examples illustrating how these machines compute. Now let timelog n denote the class of languages accepted by alternating Turing machines running k in O log n time, b eginning in an existential con guration, and making at most k 1 alternations b etween existential and universal con gurations on any computation path. Let LH the logtime hierarchyof S [Sip83] denote timelog n. k k Immerman [Imm87, Imm89] has studied the expressivepower of rst-order logic in de ning languages; he calls the resulting class FO. Due to space limitations, we refer the reader to [Imm87, Imm89] for the relevant de nitions. 0 Theorem 3 [BIS90] AC =LH=FO. Two minor complications arise from the statement of Theorem 3: 0 1. Alternating Turing machines can accept input over any alphab et , whereas FO and AC are classes of languages over the alphab et f0; 1g.Thus we simply assume a binary enco ding of any other alphab et. Alternatively, the FO and circuit frameworks can b e mo di ed to allow arbitrary alphab ets. 0 2. It is clear what it means for a function to b e computed byanAC circuit, but it is less clear how a function can b e sp eci ed in the LH or FO settings. To resolve this diculty,we use a standard 1 technique that has b een used since at least [Jon75]. For a function f with p olynomial growth rate , def th let A c; i; z = the i symbol of f z isc. Then wesay that f is in LH or FOifA is in LH f f 1 That is, there is some p olynomial p such that for all x; jf xj pjxj. 3 0 or FO. It has b een noticed by many authors e.g., [BIS90] that f is computed byAC circuits 0 2 i A 2 AC . f 0 0 Note that the comp osition of two functions in AC is also a function in AC . 0 3 Equivalence of AC and RUD log 0 Theorem 4 AC =RUD . log Pro of. This containment is mentioned in Prop osition 5 of [Vol84] where the converse containmentis left as an op en question. We present a complete pro of here. The pro of pro ceeds by induction on the de nition of RUD , showing that each language in RUD log log is in LH. The input to an ATM is assumed to have b oth ends marked by the sp ecial symbol $. Consider the inductive de nition of RUD : log 1. x; i; a and : x; i; a are in RUD . log Let L = fx; i; a : x; i; ag. Consider an alternating TM M for L: On input $x; i; a$, M existentially guesses the p ositions of all the commas there are only a constantnumber of them.
Recommended publications
  • On Uniformity Within NC
    On Uniformity Within NC David A Mix Barrington Neil Immerman HowardStraubing University of Massachusetts University of Massachusetts Boston Col lege Journal of Computer and System Science Abstract In order to study circuit complexity classes within NC in a uniform setting we need a uniformity condition which is more restrictive than those in common use Twosuch conditions stricter than NC uniformity RuCo have app eared in recent research Immermans families of circuits dened by rstorder formulas ImaImb and a unifor mity corresp onding to Buss deterministic logtime reductions Bu We show that these two notions are equivalent leading to a natural notion of uniformity for lowlevel circuit complexity classes Weshow that recent results on the structure of NC Ba still hold true in this very uniform setting Finallyweinvestigate a parallel notion of uniformity still more restrictive based on the regular languages Here we givecharacterizations of sub classes of the regular languages based on their logical expressibility extending recentwork of Straubing Therien and Thomas STT A preliminary version of this work app eared as BIS Intro duction Circuit Complexity Computer scientists have long tried to classify problems dened as Bo olean predicates or functions by the size or depth of Bo olean circuits needed to solve them This eort has Former name David A Barrington Supp orted by NSF grant CCR Mailing address Dept of Computer and Information Science U of Mass Amherst MA USA Supp orted by NSF grants DCR and CCR Mailing address Dept of
    [Show full text]
  • On the NP-Completeness of the Minimum Circuit Size Problem
    On the NP-Completeness of the Minimum Circuit Size Problem John M. Hitchcock∗ A. Pavany Department of Computer Science Department of Computer Science University of Wyoming Iowa State University Abstract We study the Minimum Circuit Size Problem (MCSP): given the truth-table of a Boolean function f and a number k, does there exist a Boolean circuit of size at most k computing f? This is a fundamental NP problem that is not known to be NP-complete. Previous work has studied consequences of the NP-completeness of MCSP. We extend this work and consider whether MCSP may be complete for NP under more powerful reductions. We also show that NP-completeness of MCSP allows for amplification of circuit complexity. We show the following results. • If MCSP is NP-complete via many-one reductions, the following circuit complexity amplifi- Ω(1) cation result holds: If NP\co-NP requires 2n -size circuits, then ENP requires 2Ω(n)-size circuits. • If MCSP is NP-complete under truth-table reductions, then EXP 6= NP \ SIZE(2n ) for some > 0 and EXP 6= ZPP. This result extends to polylog Turing reductions. 1 Introduction Many natural NP problems are known to be NP-complete. Ladner's theorem [14] tells us that if P is different from NP, then there are NP-intermediate problems: problems that are in NP, not in P, but also not NP-complete. The examples arising out of Ladner's theorem come from diagonalization and are not natural. A canonical candidate example of a natural NP-intermediate problem is the Graph Isomorphism (GI) problem.
    [Show full text]
  • Week 1: an Overview of Circuit Complexity 1 Welcome 2
    Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes).
    [Show full text]
  • Two-Way Automata Characterizations of L/Poly Versus NL
    Two-way automata characterizations of L/poly versus NL Christos A. Kapoutsis1;? and Giovanni Pighizzini2 1 LIAFA, Universit´eParis VII, France 2 DICo, Universit`adegli Studi di Milano, Italia Abstract. Let L/poly and NL be the standard complexity classes, of languages recognizable in logarithmic space by Turing machines which are deterministic with polynomially-long advice and nondeterministic without advice, respectively. We recast the question whether L/poly ⊇ NL in terms of deterministic and nondeterministic two-way finite automata (2dfas and 2nfas). We prove it equivalent to the question whether every s-state unary 2nfa has an equivalent poly(s)-state 2dfa, or whether a poly(h)-state 2dfa can check accessibility in h-vertex graphs (even under unary encoding) or check two-way liveness in h-tall, h-column graphs. This complements two recent improvements of an old theorem of Berman and Lingas. On the way, we introduce new types of reductions between regular languages (even unary ones), use them to prove the completeness of specific languages for two-way nondeterministic polynomial size, and propose a purely combinatorial conjecture that implies L/poly + NL. 1 Introduction A prominent open question in complexity theory asks whether nondeterminism is essential in logarithmic-space Turing machines. Formally, this is the question whether L = NL, for L and NL the standard classes of languages recognizable by logarithmic-space deterministic and nondeterministic Turing machines. In the late 70's, Berman and Lingas [1] connected this question to the comparison between deterministic and nondeterministic two-way finite automata (2dfas and 2nfas), proving that if L = NL, then for every s-state σ-symbol 2nfa there is a poly(sσ)-state 2dfa which agrees with it on all inputs of length ≤ s.
    [Show full text]
  • The Boolean Formula Value Problem Is in ALOGTIME (Preliminary Version)
    The Boolean formula value problem is in ALOGTIME (Preliminary Version) Samuel R. Buss¤ Department of Mathematics University of California, Berkeley January 1987 Abstract The Boolean formula value problem is in alternating log time and, more generally, parenthesis context-free languages are in alternating log time. The evaluation of reverse Polish notation Boolean formulas is also in alternating log time. These results are optimal since the Boolean formula value problem is complete for alternating log time under deterministic log time reductions. Consequently, it is also complete for alternating log time under AC0 reductions. 1. Introduction The Boolean formula value problem is to determine the truth value of a variable-free Boolean formula, or equivalently, to recognize the true Boolean sentences. N. Lynch [11] gave log space algorithms for the Boolean formula value problem and for the more general problem of recognizing a parenthesis context-free grammar. This paper shows that these problems have alternating log time algorithms. This answers the question of Cook [5] of whether the Boolean formula value problem is log space complete | it is not, unless log space and alternating log time are identical. Our results are optimal since, for an appropriately de¯ned notion of log time reductions, the Boolean formula value problem is complete for alternating log time under deterministic log time reductions; consequently, it is also complete for alternating log time under AC0 reductions. It follows that the Boolean formula value problem is not in the log time hierarchy. There are two reasons why the Boolean formula value problem is interesting. First, a Boolean (or propositional) formula is a very fundamental concept ¤Supported in part by an NSF postdoctoral fellowship.
    [Show full text]
  • A Short History of Computational Complexity
    The Computational Complexity Column by Lance FORTNOW NEC Laboratories America 4 Independence Way, Princeton, NJ 08540, USA [email protected] http://www.neci.nj.nec.com/homepages/fortnow/beatcs Every third year the Conference on Computational Complexity is held in Europe and this summer the University of Aarhus (Denmark) will host the meeting July 7-10. More details at the conference web page http://www.computationalcomplexity.org This month we present a historical view of computational complexity written by Steve Homer and myself. This is a preliminary version of a chapter to be included in an upcoming North-Holland Handbook of the History of Mathematical Logic edited by Dirk van Dalen, John Dawson and Aki Kanamori. A Short History of Computational Complexity Lance Fortnow1 Steve Homer2 NEC Research Institute Computer Science Department 4 Independence Way Boston University Princeton, NJ 08540 111 Cummington Street Boston, MA 02215 1 Introduction It all started with a machine. In 1936, Turing developed his theoretical com- putational model. He based his model on how he perceived mathematicians think. As digital computers were developed in the 40's and 50's, the Turing machine proved itself as the right theoretical model for computation. Quickly though we discovered that the basic Turing machine model fails to account for the amount of time or memory needed by a computer, a critical issue today but even more so in those early days of computing. The key idea to measure time and space as a function of the length of the input came in the early 1960's by Hartmanis and Stearns.
    [Show full text]
  • Multiparty Communication Complexity and Threshold Circuit Size of AC^0
    2009 50th Annual IEEE Symposium on Foundations of Computer Science Multiparty Communication Complexity and Threshold Circuit Size of AC0 Paul Beame∗ Dang-Trinh Huynh-Ngoc∗y Computer Science and Engineering Computer Science and Engineering University of Washington University of Washington Seattle, WA 98195-2350 Seattle, WA 98195-2350 [email protected] [email protected] Abstract— We prove an nΩ(1)=4k lower bound on the random- that the Generalized Inner Product function in ACC0 requires ized k-party communication complexity of depth 4 AC0 functions k-party NOF communication complexity Ω(n=4k) which is in the number-on-forehead (NOF) model for up to Θ(log n) polynomial in n for k up to Θ(log n). players. These are the first non-trivial lower bounds for general 0 NOF multiparty communication complexity for any AC0 function However, for AC functions much less has been known. for !(log log n) players. For non-constant k the bounds are larger For the communication complexity of the set disjointness than all previous lower bounds for any AC0 function even for function with k players (which is in AC0) there are lower simultaneous communication complexity. bounds of the form Ω(n1=(k−1)=(k−1)) in the simultaneous Our lower bounds imply the first superpolynomial lower bounds NOF [24], [5] and nΩ(1=k)=kO(k) in the one-way NOF for the simulation of AC0 by MAJ ◦ SYMM ◦ AND circuits, showing that the well-known quasipolynomial simulations of AC0 model [26]. These are sub-polynomial lower bounds for all by such circuits are qualitatively optimal, even for formulas of non-constant values of k and, at best, polylogarithmic when small constant depth.
    [Show full text]
  • Verifying Proofs in Constant Depth
    This is a repository copy of Verifying proofs in constant depth. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/74775/ Proceedings Paper: Beyersdorff, O, Vollmer, H, Datta, S et al. (4 more authors) (2011) Verifying proofs in constant depth. In: Proceedings MFCS 2011. Mathematical Foundations of Computer Science 2011, 22 - 26 August 2011, Warsaw, Poland. Springer Verlag , 84 - 95 . ISBN 978-3-642-22992-3 https://doi.org/10.1007/978-3-642-22993-0_11 Reuse See Attached Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Verifying Proofs in Constant Depth∗ Olaf Beyersdorff1, Samir Datta2, Meena Mahajan3, Gido Scharfenberger-Fabian4, Karteek Sreenivasaiah3, Michael Thomas1, and Heribert Vollmer1 1 Institut f¨ur Theoretische Informatik, Leibniz Universit¨at Hannover, Germany 2 Chennai Mathematical Institute, India 3 Institute of Mathematical Sciences, Chennai, India 4 Institut f¨ur Mathematik und Informatik, Ernst-Moritz-Arndt-Universit¨at Greifswald, Germany Abstract. In this paper we initiate the study of proof systems where verification of proofs proceeds by NC0 circuits. We investigate the ques- tion which languages admit proof systems in this very restricted model. Formulated alternatively, we ask which languages can be enumerated by NC0 functions. Our results show that the answer to this problem is not determined by the complexity of the language. On the one hand, we con- struct NC0 proof systems for a variety of languages ranging from regular to NP-complete.
    [Show full text]
  • Lecture 13: Circuit Complexity 1 Binary Addition
    CS 810: Introduction to Complexity Theory 3/4/2003 Lecture 13: Circuit Complexity Instructor: Jin-Yi Cai Scribe: David Koop, Martin Hock For the next few lectures, we will deal with circuit complexity. We will concentrate on small depth circuits. These capture parallel computation. Our main goal will be proving circuit lower bounds. These lower bounds show what cannot be computed by small depth circuits. To gain appreciation for these lower bound results, it is essential to first learn about what can be done by these circuits. In next two lectures, we will exhibit the computational power of these circuits. We start with one of the simplest computations: integer addition. 1 Binary Addition Given two binary numbers, a = a1a2 : : : an−1an and b = b1b2 : : : bn−1bn, we can add the two using the elementary school method { adding each column and carrying to the next. In other words, r = a + b, an an−1 : : : a1 a0 + bn bn−1 : : : b1 b0 rn+1 rn rn−1 : : : r1 r0 can be accomplished by first computing r0 = a0 ⊕ b0 (⊕ is exclusive or) and computing a carry bit, c1 = a0 ^ b0. Now, we can compute r1 = a1 ⊕ b1 ⊕ c1 and c2 = (c1 ^ (a1 _ b1)) _ (a1 ^ b1), and in general we have rk = ak ⊕ bk ⊕ ck ck = (ck−1 ^ (ak _ bk)) _ (ak ^ bk) Certainly, the above operation can be done in polynomial time. The main question is, can we do it in parallel faster? The computation expressed above is sequential. Before computing rk, one needs to compute all the previous output bits.
    [Show full text]
  • Relationships Among PL, #L, and the Determinant
    Relationships Among PL, L, and the Determinant y z Eric Allender Mitsunori Ogihara Department of Computer Science Department of Computer Science Hill Center, Busch Campus, P.O. Box 1179 UniversityofRochester Piscataway, NJ 08855-117 9, USA Ro chester, NY 14627 [email protected] [email protected] Abstract Recent results byTo da, Vinay, Damm, and Valianthave shown that the complexity of the determinantischaracterized by the complexity of counting the numb er of accepting compu- tations of a nondeterministic logspace-b ounded machine. This class of functions is known as L. By using that characterization and by establishing a few elementary closure prop erties, we givea very simple pro of of a theorem of Jung, showing that probabilistic logspace-b ounded PL machines lose none of their computational p ower if they are restricted to run in p olynomial time. We also present new results comparing and contrasting the classes of functions reducible to PL, L, and the determinant, using various notions of reducibility. 1 Intro duction One of the most imp ortant and in uential early results of complexity theory is the theorem of [47] showing that the complexity of computing the p ermanentofaninteger matrix is characterized by the complexity class P of functions that count the numb er of accepting computation paths of a nondeterministic p olynomial-time machine. It is p erhaps surprising that well over a decade passed b efore it was discovered that an equally-close connection exists b etween the complexityof computing the determinant of a matrix and the class L de ned in [5] of functions that count the numb er of accepting computation paths of a nondeterministic logspace-b ounded machine.
    [Show full text]
  • On a Theory of Computation and Complexity Over the Real Numbers: Np-Completeness, Recursive Functions and Universal Machines1
    BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 21, Number 1, July 1989 ON A THEORY OF COMPUTATION AND COMPLEXITY OVER THE REAL NUMBERS: NP-COMPLETENESS, RECURSIVE FUNCTIONS AND UNIVERSAL MACHINES1 LENORE BLUM2, MIKE SHUB AND STEVE SMALE ABSTRACT. We present a model for computation over the reals or an arbitrary (ordered) ring R. In this general setting, we obtain universal machines, partial recursive functions, as well as JVP-complete problems. While our theory reflects the classical over Z (e.g., the computable func­ tions are the recursive functions) it also reflects the special mathematical character of the underlying ring R (e.g., complements of Julia sets provide natural examples of R. E. undecidable sets over the reals) and provides a natural setting for studying foundational issues concerning algorithms in numerical analysis. Introduction. We develop here some ideas for machines and computa­ tion over the real numbers R. One motivation for this comes from scientific computation. In this use of the computer, a reasonable idealization has the cost of multiplication independent of the size of the number. This contrasts with the usual theoretical computer science picture which takes into account the number of bits of the numbers. Another motivation is to bring the theory of computation into the do­ main of analysis, geometry and topology. The mathematics of these sub­ jects can then be put to use in the systematic analysis of algorithms. On the other hand, there is an extensively developed subject of the theory of discrete computation, which we don't wish to lose in our theory.
    [Show full text]
  • Formal Theories for Linear Algebra
    Formal Theories for Linear Algebra Stephen Cook and Lila Fontes Department of Computer Science, University of Toronto fsacook, [email protected] Abstract. We introduce two-sorted theories in the style of [CN10] for the complexity classes ⊕L and DET , whose complete problems include determinants over Z2 and Z, respectively. We then describe interpreta- tions of Soltys' linear algebra theory LAp over arbitrary integral domains, into each of our new theories. The result shows equivalences of standard theorems of linear algebra over Z2 and Z can be proved in the corre- sponding theory, but leaves open the interesting question of whether the theorems themselves can be proved. 1 Introduction This paper introduces formal theories for the complexity classes ⊕L (also called P arityL) and DET for reasoning about linear algebra over the rings Z2 and Z, respectively. Complete problems for these classes include standard computa- tional problems of linear algebra over their respective rings, such as computing determinants, matrix powers, and coefficients of the characteristic polynomial of a matrix [BDHM92]. (Recently [BKR09] proved that for each k ≥ 1, computing the permanent mod 2k of an integer matrix is in ⊕L, and hence complete.) Each theory allows induction over any relation in the associated complexity class ⊕L or DET , and the functions definable in each theory are the functions in the class. Thus determinants and characteristic polynomials can be defined in the theories, but it is not clear that their standard properties can be proved without defining concepts outside the associated complexity classes. This remains an interesting open question [SK01,SC04].
    [Show full text]