DLOGTIME Versus NLOGTIME Frank Vega

Total Page:16

File Type:pdf, Size:1020Kb

DLOGTIME Versus NLOGTIME Frank Vega DLOGTIME versus NLOGTIME Frank Vega To cite this version: Frank Vega. DLOGTIME versus NLOGTIME. 2015. hal-01132561 HAL Id: hal-01132561 https://hal.archives-ouvertes.fr/hal-01132561 Preprint submitted on 17 Mar 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. DLOGTIME versus NLOGTIME Frank Vega Abstract The P versus NP problem has become in one of the most interesting and crucial ques- tions for many fields such as computer science, mathematics, biology and others. This outstanding problem consists in knowing the answer of the following incognita: Is P equal to NP? We show a solution of this question in a lower level that would be the answer of DLOGTIME versus NLOGTIME problem. Keywords: DLOGTIME, NLOGTIME, P, NP, MAXIMUM, Turing machine 2000 MSC: 68-XX, 68Qxx, 68Q15 1. Introduction The P versus NP problem is a major unsolved problem in computer science. This problem was introduced in 1971 by Stephen Cook [1]. It is considered by many to be the most important open problem in the field [2]. The Turing machine has been a useful concept in theory of computing since it was created by Alan Turing in the last century [3]. Since then, it has appeared new defi- nitions related with this concept such as the deterministic or nondeterministic Turing machine. A deterministic Turing machine has only one next action for each step de- fined in its program or transition function [4]. A nondeterministic Turing machine can contain more than one action defined for each step of the program where this program is not a function but a relation [4]. Another huge advance was the definition of a complexity class. A language L over an alphabet is any set of strings made up of symbols from that alphabet [5]. A Email address: [email protected] (Frank Vega) Preprint submitted to Theoretical Computer Science March 16, 2015 complexity class is a set of problems, which are represented as a language, grouped by measures such as the running time, memory, etc [5]. In computational complexity theory, the class P consists of all those decision prob- lems (defined as languages) that can be solved on a deterministic Turing machine in an amount of time that is polynomial in the size of the input; the class NP consists of all those decision problems whose positive solutions can be verified in polynomial time given the right information, or equivalently, whose solution can be found in polynomial time on a nondeterministic Turing machine [4]. The set of languages decided by nondeterministic Turing machines within time f is denoted NT IME( f (n)) [6]. In case of languages would be decided by deterministic Turing machines within time f is denoted DT IME( f (n)) [6]. Then, the P =? NP question would be equivalent to DT IME(nk) =? NT IME(nk) where DT IME(nk) = S j k S j j>0 DT IME(n ) and NT IME(n ) = j>0 NT IME(n ) [6]. We pretend to show in the next few pages the solution of DLOGT IME = DT IME(log(n)) versus NLOGT IME = NT IME(log(n)) problem. 2. Theoretical framework Let’s explain a simple notation that we frequently use in the paper. Definition 2.1. For any instance I, the notation jIj is the bit-length of I. The following subsections will help you to understand better this proof. 2.1. The Turing machine model The argument made by Alan Turing in the twentieth century proves mathematically that for any computer program we can create an equivalent Turing machine [3]. A Turing machine M has a finite set of states and a finite set of symbols called the alphabet of M. The set of states has a special s state which is known as the initial state. The alphabet contains special symbols such as the B start symbol and the $ blank symbol. The operations of a Turing machine are based on a transition function δ which takes the initial state with a string of symbols of the alphabet that is known as the input. Then, it proceeds to reading the symbols on the cells contained in a tape through 2 a head or cursor. At the same time, the symbols on each step are erased and written by the transition function and later moved to the left −, right −! or remained in the same place − for each cell. Finally, this process is interrupted if it halts in a final state: the state of acceptance “yes”, the rejection “no” or halting h [7]. A Turing machine halts if it reaches a final state. If a Turing machine M accepts or rejects a string x, then M(x) = “yes” or “no” is respectively written. If it reaches the halting state h, then we write M(x) = y where the string y is considered as the output string, i.e., the string remaining in M when this halts [7]. A transition function δ is also called the “program” of the Turing machine and is represented as the triple δ(q; σ) = (p; ρ, D). For each q current state and σ current symbol of the alphabet, the Turing machine will go to the next p state, overwrite the σ symbol by ρ and move the cursor in the direction D 2 f −; −!; −} [7]. When M is a nondeterministic Turing machine, the program δ is not longer a function, but a relation. 2.2. The MAXIMUM problem Definition 2.2. Given an A array of n (distinct) integer numbers and a x integer, MAXIMUM is the problem of deciding whether x is the maximum number in A. How many comparisons are necessary to determine when some integer is the maxi- mum of an array of n elements? We can easily obtain a upper bound of n comparisons: examine each element of the array in turn and keep track of the largest element seen so far and finally we compare the final result with x [5]. Is this the best we can do? Yes, since we can obtain a lower bound of n−1 comparisons for the problem of determining the maximum in an array of integers and one final comparison to verify whether that maximum is equal to x or not [5]. Hence, n comparisons are necessary to determine whether an element x is the maximum in A and this naive algorithm for MAXIMUM is optimal with respect to the number of comparisons performed [5]. 3. Results 3.1. The BOUNDED-MAXIMUM problem Definition 3.1. Given an A array of n (distinct) positive integer numbers and a x inte- ger where jAj ≤ n2, BOUNDED − MAXIMUM is the problem of deciding whether x 3 is the maximum number in A. Theorem 3.2. BOUNDED − MAXIMUM < DLOGT IME. Proof. If the pair A and x belongs to BOUNDED − MAXIMUM, then the maximum bit-length of x should be less than or equal to jAj, because x will be in A. As we see in Definition 2.2, we should use n comparisons to know whether x is the maximum in array of n (distinct) integers and this number of comparisons will be optimal [5]. This would mean we cannot always accept any (A; x) instance of BOUNDED−MAXIMUM in O(log(jAj)) time, because we must use at least n comparisons in many cases and it will not exist a k constant number such that k × log(jAj) > n for every value of n. The reason is jAj ≤ n2, and thus, log(jAj) ≤ log(n2) = 2 × log(n), but n will be exponentially greater than 2 × log(n). 3.2. NLOGTIME problems Definition 3.3. Given an A array of n (distinct) positive integer numbers and a x in- teger where jAj ≤ n2, IS − IN − ARRAY is the problem of deciding whether x is in A. Theorem 3.4. IS − IN − ARRAY 2 NLOGT IME. Proof. Given an A array of n (distinct) positive integer numbers and a x integer where jAj ≤ n2, we are going to create an algorithm which decides whether x is in A by a nondeterministic Turing machine in O(log(jAj)) time. For that purpose, we create a nondeterministic Turing machine N such that for the empty string as input, N will output a positive integer i in a nondeterministic way where 0 ≤ i ≤ (2(blog2(n)c+1) − 1). The program δ of N is built as follows: (i) we create k = (blog2(n)c + 1) different p j states in N where 1 ≤ j ≤ k and; (ii) for each p j and p j+1 states, we create the following actions in N: δ(p j; $) = (p j+1; 0; −!) (1) δ(p j; $) = (p j+1; 1; −!) (2) 4 (iii) the halting state in N will be related to the k − th state pk with the following actions: δ(pk; $) = (h; 0; −) (3) δ(pk; $) = (h; 1; −) (4) (iv) and finally, the initial state in N will be into a single action: δ(s; B) = (p1; B; −!) (5) After that, an algorithm for IS − IN − ARRAY will be very simple: (1) first, we take the positive integer i as output of the running of N with the empty string where 0 ≤ i ≤ (2(blog2(n)c+1) − 1); (2) next, if i > n or i = 0, then we halt in the state of rejection; (3) else, we obtain the y = A[i] positive integer using the array indexing; (4) finally, we accept when x is equal to y otherwise we reject.
Recommended publications
  • On Uniformity Within NC
    On Uniformity Within NC David A Mix Barrington Neil Immerman HowardStraubing University of Massachusetts University of Massachusetts Boston Col lege Journal of Computer and System Science Abstract In order to study circuit complexity classes within NC in a uniform setting we need a uniformity condition which is more restrictive than those in common use Twosuch conditions stricter than NC uniformity RuCo have app eared in recent research Immermans families of circuits dened by rstorder formulas ImaImb and a unifor mity corresp onding to Buss deterministic logtime reductions Bu We show that these two notions are equivalent leading to a natural notion of uniformity for lowlevel circuit complexity classes Weshow that recent results on the structure of NC Ba still hold true in this very uniform setting Finallyweinvestigate a parallel notion of uniformity still more restrictive based on the regular languages Here we givecharacterizations of sub classes of the regular languages based on their logical expressibility extending recentwork of Straubing Therien and Thomas STT A preliminary version of this work app eared as BIS Intro duction Circuit Complexity Computer scientists have long tried to classify problems dened as Bo olean predicates or functions by the size or depth of Bo olean circuits needed to solve them This eort has Former name David A Barrington Supp orted by NSF grant CCR Mailing address Dept of Computer and Information Science U of Mass Amherst MA USA Supp orted by NSF grants DCR and CCR Mailing address Dept of
    [Show full text]
  • Collapsing Exact Arithmetic Hierarchies
    Electronic Colloquium on Computational Complexity, Report No. 131 (2013) Collapsing Exact Arithmetic Hierarchies Nikhil Balaji and Samir Datta Chennai Mathematical Institute fnikhil,[email protected] Abstract. We provide a uniform framework for proving the collapse of the hierarchy, NC1(C) for an exact arith- metic class C of polynomial degree. These hierarchies collapses all the way down to the third level of the AC0- 0 hierarchy, AC3(C). Our main collapsing exhibits are the classes 1 1 C 2 fC=NC ; C=L; C=SAC ; C=Pg: 1 1 NC (C=L) and NC (C=P) are already known to collapse [1,18,19]. We reiterate that our contribution is a framework that works for all these hierarchies. Our proof generalizes a proof 0 1 from [8] where it is used to prove the collapse of the AC (C=NC ) hierarchy. It is essentially based on a polynomial degree characterization of each of the base classes. 1 Introduction Collapsing hierarchies has been an important activity for structural complexity theorists through the years [12,21,14,23,18,17,4,11]. We provide a uniform framework for proving the collapse of the NC1 hierarchy over an exact arithmetic class. Using 0 our method, such a hierarchy collapses all the way down to the AC3 closure of the class. 1 1 1 Our main collapsing exhibits are the NC hierarchies over the classes C=NC , C=L, C=SAC , C=P. Two of these 1 1 hierarchies, viz. NC (C=L); NC (C=P), are already known to collapse ([1,19,18]) while a weaker collapse is known 0 1 for a third one viz.
    [Show full text]
  • Limits to Parallel Computation: P-Completeness Theory
    Limits to Parallel Computation: P-Completeness Theory RAYMOND GREENLAW University of New Hampshire H. JAMES HOOVER University of Alberta WALTER L. RUZZO University of Washington New York Oxford OXFORD UNIVERSITY PRESS 1995 This book is dedicated to our families, who already know that life is inherently sequential. Preface This book is an introduction to the rapidly growing theory of P- completeness — the branch of complexity theory that focuses on identifying the “hardest” problems in the class P of problems solv- able in polynomial time. P-complete problems are of interest because they all appear to lack highly parallel solutions. That is, algorithm designers have failed to find NC algorithms, feasible highly parallel solutions that take time polynomial in the logarithm of the problem size while using only a polynomial number of processors, for them. Consequently, the promise of parallel computation, namely that ap- plying more processors to a problem can greatly speed its solution, appears to be broken by the entire class of P-complete problems. This state of affairs is succinctly expressed as the following question: Does P equal NC ? Organization of the Material The book is organized into two parts: an introduction to P- completeness theory, and a catalog of P-complete and open prob- lems. The first part of the book is a thorough introduction to the theory of P-completeness. We begin with an informal introduction. Then we discuss the major parallel models of computation, describe the classes NC and P, and present the notions of reducibility and com- pleteness. We subsequently introduce some fundamental P-complete problems, followed by evidence suggesting why NC does not equal P.
    [Show full text]
  • Time, Hardware, and Uniformity
    This is page Printer Opaque this Time Hardware and Uniformity David Mix Barrington Neil Immerman ABSTRACT We describ e three orthogonal complexity measures parallel time amount of hardware and degree of nonuniformity which together parametrize most complexity classes Weshow that the descriptive com plexity framework neatly captures these measures using three parameters quantier depth number of variables and typ e of numeric predicates re sp ectively A fairly simple picture arises in which the basic questions in complexity theory solved and unsolved can b e understo o d as ques tions ab out tradeos among these three dimensions Intro duction An initial presentation of complexity theory usually makes the implicit as sumption that problems and hence complexity classes are linearly ordered by diculty In the Chomsky Hierarchyeach new typ e of automaton can decide more languages and the Time Hierarchy Theorem tells us that adding more time allowsaTuring machine to decide more languages In deed the word complexity is often used eg in the study of algorithms to mean worstcase Turing machine running time under which problems are linearly ordered Those of us who study structural complexityknow that the situation is actually more complicated For one thing if wewant to mo del parallel com putation we need to distinguish b etween algorithms whichtakethesame amountofwork ie sequential time wecarehowmany pro cesses are op erating in parallel and howmuch parallel time is taken These two dimen sions of complexity are identiable in all the usual mo
    [Show full text]
  • A Small Span Theorem Within P 1 Introduction
    A Small Span Theorem within P Wolfgang Lindner and Rainer Schuler Abteilung Theoretische Informatik Universitat Ulm Ob erer Eselsb erg Ulm GERMANY Abstract The development of Small Span Theorems for various complexity classes and re ducibili ties plays a basic role in resource b ounded measuretheoretic investigations of ecient reductions A Small Span Theorem for a complexity class C and reducibil ity is the assertion that for all sets A in C at least one of the cones b elowor r ab ove A is a negligible small class with resp ect to C where the cones b eloworabove A refer to the sets fB B Ag and fB A B g resp ectively That is a Small r r Span Theorem rules out one of the four p ossibilities of the size of upp er and lower cones for a set in C Here we use the recent formulation of resourceb ounded measure of Allender and Strauss whichallows meaningful notions of measure on p olynomialtime complexity classes Weshowtwo Small Span Theorems for p olynomialtime complexity classes and sublineartime reducibili ties namely a Small Span Theorem for P and Dlogtime NP uniform NC computable reductions and for P and Dlogtimetransformations Furthermore weshow that for every xed k the hard set for P under Dlogtime k uniform AC reductions of depth k and size n is a small class In contrast weshow that every upp er cone under Puniform NC reductions is not small Intro duction Resourceb ounded measure provides a to ol to investigate abundance phenomena in complexity classes Besides insights in the measuretheoretic structure of complexity classes
    [Show full text]
  • The Division Breakthroughs Eric Allender 1
    The Division Breakthroughs Eric Allender 1 1 Introduction All of us learn to do arithmetic in grade school. The algorithms for addition and subtraction take some time to master, and the multiplication algorithm is even more complicated. Eventually students learn the division algorithm; most students find it to be complicated, time-consuming, and tedious. Is there a better way to divide? For most practical purposes, the correct way to answer this question is to con- sider the time-complexity of division; what is the fastest division algorithm? That is not the subject of this article. I am not aware of any recent breakthrough on this question; any good textbook on design and analysis of algorithms will tell you about the current state of the art on that front. Complexity theory gives us an equally-valid way to ask about the complexity of division: In what complexity class does division lie? One of the most important subclasses of P (and one of the first to be defined and studied) is the class L (deterministic logarithmic space). It is easy to see how to add and subtract in L. It is a simple exercise to show that multiplication can be computed in logspace, too. However, it had been an open question since the 1960’s if logspace machines can divide. This was fairly annoying. Let me give an example, to illustrate how annoying this was. We like to think of complexity classes as capturing fundamental aspects of computation. The question of whether a particular problem lies in a complexity class or not should not depend on trivial matters, such as minor issues of encoding.
    [Show full text]
  • Arxiv:1909.05828V3 [Cs.CC] 13 Mar 2020 Novel) Acceptance Condition, Covered in Section 2
    Sublinear-Time Language Recognition and Decision by One-Dimensional Cellular Automata Augusto Modanese Karlsruhe Institute of Technology (KIT), Germany [email protected] Abstract After an apparent hiatus of roughly 30 years, we revisit a seemingly neglected subject in the theory of (one-dimensional) cellular automata: sublinear-time computation. The model considered is that of ACAs, which are language acceptors whose acceptance condition depends on the states of all cells in the automaton. We prove a time hierarchy theorem for sublinear-time ACA classes, analyze their intersection with the regular languages, and, finally, establish strict inclusions in the parallel computation classes SC and (uniform) AC. As an addendum, we introduce and investigate the concept of a decider ACA (DACA) as a candidate for a decider counterpart to (acceptor) ACAs. We show the class of languages decidable in constant time by DACAs equals the locally testable languages, and we also p determine Ω( n) as the (tight) time complexity threshold for DACAs up to which no advantage compared to constant time is possible. 1 Introduction While there have been several works on linear- and real-time language recognition by cellular automata over the years (see, e.g., [17, 27] for an overview), interest in the sublinear-time case has been scanty at best. We can only speculate this has been due to a certain obstinacy concerning what is now the established acceptance condition for cellular automata, namely that the first cell determines the automaton’s response, despite alternatives being long known [21]. Under this condition, only a constant-size prefix can ever influence the automaton’s decision, which effectively dooms sublinear time to be but a trivial case just as it is for (classical) Turing machines, for example.
    [Show full text]
  • DLOGTIME Proof Systems
    DLOGTIME Proof Systems Andreas Krebs1 and Nutan Limaye2 1 University of Tübingen, Germany, [email protected] 2 Indian Institute of Technology, Bombay, India, [email protected] Abstract We define DLOGTIME proof systems, DLTPS, which generalize NC0 proof systems. It is known 0 that functions such as Exactk and Majority do not have NC proof systems. Here, we give a DLTPS for Exactk (and therefore for Majority) and also for other natural functions such as Reach and Cliquek. Though many interesting functions have DLTPS, we show that there are languages in NP which do not have DLTPS. We consider the closure properties of DLTPS and prove that they are closed under union and concatenation but are not closed under intersection and complement. Finally, we consider a hierarchy of polylogarithmic time proof systems and show that the hierarchy is strict. 1998 ACM Subject Classification F.1.3 Complexity Measures and Classes Keywords and phrases Proof systems, DLOGTIME, NC0 Digital Object Identifier 10.4230/LIPIcs.FSTTCS.2013.189 1 Introduction In a seminal paper by Cook and Reckhow [6] a proof system for a language was defined as a polynomial time computable function, called a verifier, whose range is all the words in the language. For any language in NP, there exists such a proof system. This therefore gives a way of viewing the complexity classes in the framework of proof systems. Polynomial time verifiers naturally characterize languages in NP. To understand complexity classes that contain NP, some works have considered proof systems with more powerful verifiers. (See for example [9, 5, 4, 3].) Taking a dual approach, proof systems with very weak verifiers have been recently studied in [2, 8].
    [Show full text]
  • Chicago Journal of Theoretical Computer Science the MIT Press
    Chicago Journal of Theoretical Computer Science The MIT Press Volume 1999, Article 7 The Permanent Requires Large Uniform Threshold Circuits ISSN 1073–0486. MIT Press Journals, Five Cambridge Center, Cambridge, MA 02142-1493 USA; (617)253-2889; [email protected], [email protected]. Published one article at a time in LATEX source form on the Internet. Pag- ination varies from copy to copy. For more information and other articles see: http://mitpress.mit.edu/CJTCS/ • http://www.cs.uchicago.edu/publications/cjtcs/ • ftp://mitpress.mit.edu/pub/CJTCS • ftp://cs.uchicago.edu/pub/publications/cjtcs • The Chicago Journal of Theoretical Computer Science is abstracted or in- R R R dexed in Research Alert, SciSearch, Current Contents /Engineering Com- R puting & Technology,andCompuMath Citation Index. c 1999 The Massachusetts Institute of Technology. Subscribers are licensed to use journal articles in a variety of ways, limited only as required to ensure fair attribution to authors and the journal, and to prohibit use in a competing commercial product. See the journal’s World Wide Web site for further details. Address inquiries to the Subsidiary Rights Manager, MIT Press Journals; (617)253-2864; [email protected]. The Chicago Journal of Theoretical Computer Science is a peer-reviewed scholarly journal in theoretical computer science. The journal is committed to providing a forum for significant results on theoretical aspects of all topics in computer science. Editor-in-Chief: Janos Simon Consulting Editors: Joseph Halpern, Eric Allender,
    [Show full text]
  • Uniformity and Nonuniformity in Proof Complexity
    U NIFORMITYAND N ONUNIFORMITYIN P ROOF C OMPLEXITY by Kaveh Ghasemloo A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Computer Science University of Toronto c Copyright 2016 by Kaveh Ghasemloo Abstract Uniformity and Nonuniformity in Proof Complexity Kaveh Ghasemloo Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2016 This thesis is dedicated to the study of the relations between uniform and nonuniform proof complexity and computational complexity. Nonuniform proof complexity studies the lengths of proofs in various propositional proof systems such as Frege. Uniform proof complexity studies the provability strength of bounded arithmetic theories which use only concepts computable in specific computational complexity classes, e.g. the two-sorted bounded arithmetic theory VNC1 uses only concepts computable in NC1. We are interested in transferring concepts, tools, and results from computational complexity to proof complexity. We introduce the notion of proof complexity class which corresponds to the notion of computational complexity class. We show the possibility of developing a systematic framework for studying proof complexity classes associated with computational complexity classes. The framework is based on soundness statements for proof complexity classes and evaluation problems for circuit complexity classes. The soundness statements are universal for proof complexity classes as circuit evaluation problems are complete for computational complexity classes. We introduce the notion of io-typed theories to design theories corresponding to com- putational complexity classes which are not closed under composition. We use io-types to control the composition of provably total functions of theories. We design a new class of theories n#-ioV¥ (# < 1) corresponding to AC0(exp(n#)) = AltTime(O(1), O(n#)), bounded-alternation sublinear-time computable concepts.
    [Show full text]
  • On TC Lower Bounds for the Permanent
    On TC0 Lower Bounds for the Permanent Jeff Kinne Indiana State University [email protected] September 5, 2012 Abstract In this paper we consider the problem of proving lower bounds for the permanent. An ongoing line of research has shown super-polynomial lower bounds for slightly-non-uniform small-depth threshold and arithmetic circuits [All99, KP09, JS11, JS12]. We prove a new parameterized lower bound that includes each of the previous results as sub-cases. Our main result implies that the permanent does not have Boolean threshold circuits of the following kinds. 1. Depth O(1), poly-log(n) bits of non-uniformity, and size s(n) such that for all constants c, s(c)(n) < 2n. The size s must satisfy another technical condition that is true of functions normally dealt with (such as compositions of polynomials, logarithms, and exponentials). 2. Depth o(log log n), poly-log(n) bits of non-uniformity, and size nO(1). 3. Depth O(1), no(1) bits of non-uniformity, and size nO(1). Our proof yields a new “either or” hardness result. One instantiation is that either NP does not have polynomial-size constant-depth threshold circuits that use no(1) bits of non-uniformity, or the permanent does not have polynomial-size general circuits. 1 Introduction The Search for Hard Problems Computational complexity aims to determine the compu- tational costs of solving important problems, requiring both upper bounds and lower bounds. Though many types of lower bounds have been difficult to prove, conjectured lower bounds have become central across complexity theory.
    [Show full text]
  • The Pervasive Reach of Resource-Bounded Kolmogorov Complexity in Computational Complexity Theory∗
    The Pervasive Reach of Resource-Bounded Kolmogorov Complexity in Computational Complexity Theory∗ Eric Allendery Rutgers University Piscataway, NJ, USA [email protected] Michal Kouck´yz Institute of Mathematics of the Academy of Sciences of the Czech Republic Prague, Czech Republic [email protected] Detlef Ronneburgerx Sambuddha Roy Bloomberg LP India Research Laboratory, IBM, New Delhi, India [email protected] [email protected] ∗Much of this material appeared in preliminary form as “Derandomization and Distinguishing Complexity” in the proceedings of the 2003 IEEE Conference on Computational Complexity [AKRR03]. yPartially supported by NSF grants DMS-0652582, CCF-0830133, and CCF-0832787. Some of this work was performed while this author was a visiting scholar at the University of Cape Town. zSupported in part by NSF grant CCF-0514703 and by grants GA CRˇ 201/07/P276 and P202/10/0854, project No. 1M0021620808 of MSMTˇ CR,ˇ Institutional Research Plan No. AV0Z10190503 and grant IAA100190902 of GA AV CR.ˇ xThis work was done while at York College, City University of New York. Abstract We continue an investigation into resource-bounded Kolmogorov complexity [ABK+06], which highlights the close connections between circuit complexity and Levin’s time-bounded Kolmogorov complexity measure Kt (and other measures with a similar flavor), and also exploits derandomization techniques to provide new insights regarding Kolmogorov complexity. The Kolmogorov measures that have been introduced have many advantages over other approaches to defining resource-bounded Kolmogorov complexity (such as much greater independence from the underlying choice of universal machine that is used to define the measure) [ABK +06].
    [Show full text]