Results 1 
9 of
9
An application of boolean complexity to separation problems in bounded arithmetic
 Proc. London Math. Society
, 1994
"... We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial local search ( ..."
Abstract

Cited by 55 (15 self)
 Add to MetaCart
We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial local search (PLS) problems. Although it is still an open problem whether bounded arithmetic S2 is finitely axiomatizable, considerable progress on this question has been made: S2 +1 is V2f+1conservative over T'2 [3], but it is not V2!f+2conservative unless £f+2 = Ylf+2 [10], and in addition, T2 is not VZf+1conservative over S'2 unless LogSpace s? = Af+1 [8]. In particular, S2 is not finitely axiomatizable provided that the polynomialtime hierarchy does not collapse [10]. For the theory S2(a) these results imply (with some additional arguments) absolute results: S'2 + (a) is V2f+,(a)conservative but not VZf+2(a)conservative over T'2(a), and T'2(a) is not VZf+i(c*)conservative over S'2(a). Here a represents a new uninterpreted predicate symbol adjoined to the language of arithmetic which may be used in induction formulas; from a computer science perspective, a represents an oracle. In this paper we pursue this line of investigation further by showing that T'2(a) is also not V2f(a)conservative over S'2(a). This was known for / = 1, 2 by [9,17] (see also [2]), and our present proof uses a version of the pigeonhole principle similar to the arguments in [2,9]. Perhaps more importantly, we formulate a general method (Theorem 2.6) which can be used to show the unprovability of other 2f(a)formulas from S'2(a). Our methods are analogous in spirit to the proof strategy of [8]: prove a witnessing theorem to show that provability of a Zf+1(a)formula A in S'2(a) implies that it is witnessed by a function of certain complexity and then employ techniques of boolean complexity to construct an oracle a such that the formula A cannot be witnessed by a function of the prescribed complexity. Our formula A shall be 2f(a) and thus we can use the original witnessing theorem of [2]. The boolean complexity used is the same as in [8], namely Hastad's switching lemmas [6].
Witnessing Functions in Bounded Arithmetic and Search Problems
, 1994
"... We investigate the possibility to characterize (multi)functions that are \Sigma b i definable with small i (i = 1; 2; 3) in fragments of bounded arithmetic T2 in terms of natural search problems defined over polynomialtime structures. We obtain the following results: 1. A reformulation of known ..."
Abstract

Cited by 35 (4 self)
 Add to MetaCart
We investigate the possibility to characterize (multi)functions that are \Sigma b i definable with small i (i = 1; 2; 3) in fragments of bounded arithmetic T2 in terms of natural search problems defined over polynomialtime structures. We obtain the following results: 1. A reformulation of known characterizations of (multi)functions that are \Sigma b 1  and \Sigma b 2 definable in the theories S 1 2 and T 1 2 . 2. New characterizations of (multi)functions that are \Sigma b 2  and \Sigma b 3  definable in the theory T 2 2 . 3. A new nonconservation result: the theory T 2 2 (ff) is not 8\Sigma b 1 (ff) conservative over the theory S 2 2 (ff). To prove that the theory T 2 2 (ff) is not 8\Sigma b 1 (ff)conservative over the theory S 2 2 (ff), we present two examples of a \Sigma b 1 (ff)principle separating the two theories: (a) the weak pigeonhole principle WPHP (a 2 ; f; g) formalizing that no function f is a bijection between a 2 and a with the inverse...
Relating the Bounded Arithmetic and Polynomial Time Hierarchies
 Annals of Pure and Applied Logic
, 1994
"... The bounded arithmetic theory S 2 is finitely axiomatized if and only if the polynomial hierarchy provably collapses. If T 2 equals S then T 2 is equal to S 2 and proves that the polynomial time hierarchy collapses to # , and, in fact, to the Boolean hierarchy over # and to # i+1 / ..."
Abstract

Cited by 28 (1 self)
 Add to MetaCart
The bounded arithmetic theory S 2 is finitely axiomatized if and only if the polynomial hierarchy provably collapses. If T 2 equals S then T 2 is equal to S 2 and proves that the polynomial time hierarchy collapses to # , and, in fact, to the Boolean hierarchy over # and to # i+1 /poly .
Satisfiability, Branchwidth and Tseitin Tautologies
, 2002
"... For a CNF , let w b () be the branchwidth of its underlying hypergraph. ..."
Abstract

Cited by 21 (2 self)
 Add to MetaCart
For a CNF , let w b () be the branchwidth of its underlying hypergraph.
The Witness Function Method and Provably Recursive Functions of Peano
 Logic, Methodology and Philosophy of Science IX
, 1994
"... This paper presents a new proof of the characterization of the provably recursive functions of the fragments I# n of Peano arithmetic. The proof method also characterizes the # k definable functions of I# n and of theories axiomatized by transfinite induction on ordinals. The proofs are complete ..."
Abstract

Cited by 5 (0 self)
 Add to MetaCart
This paper presents a new proof of the characterization of the provably recursive functions of the fragments I# n of Peano arithmetic. The proof method also characterizes the # k definable functions of I# n and of theories axiomatized by transfinite induction on ordinals. The proofs are completely prooftheoretic and use the method of witness functions and witness oracles.
Combinatorics in Bounded Arithmetics
, 2004
"... A basic aim of logic is to consider what axioms are used in proving various theorems of mathematics. This thesis will be concerned with such issues applied to a particular area of mathematics: combinatorics. We will consider two widely known groups of proof methods in combinatorics, namely, probabil ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
A basic aim of logic is to consider what axioms are used in proving various theorems of mathematics. This thesis will be concerned with such issues applied to a particular area of mathematics: combinatorics. We will consider two widely known groups of proof methods in combinatorics, namely, probabilistic methods and methods using linear algebra. We will consider certain applications of such methods, both of which are significant to Ramsey theory. The systems we choose to work in are various theories of bounded arithmetic. For the probabilistic method, the key point is that we use the weak pigeonhole principle to simulate the probabilistic reasoning. We formalize various applications of the ordinary probabilistic method and linearity of expectations, making partial progress on the Local Lemma. In the case of linearity of expectations, we show how to eliminate the weak pigeonhole principle by simulating the derandomization technique of “conditional probabilities.” We consider linear algebra methods applied to various set system theorems. We formalize some theorems using a linear algebra principle as an extra axiom. We also show how weaker results can be attained by giving alternative proofs that avoid linear algebra, and thus also avoid the extra axiom. We formalize upper and lower Ramsey bounds. For the lower bounds, both the probabilistic methods and the linear algebra methods are used. We provide a stratification of the various Ramsey lower bounds, showing that stronger bounds can be proved in stronger theories. A natural question is whether or not the axioms used are necessary. We provide “reversals” in a few cases, showing that the principle used to prove the theorem is in fact a consequence of the theorem (over some base theory). Thus this work can be seen as a (humble) beginning in the direction of developing the Reverse Mathematics of finite combinatorics.
Fragments of Approximate Counting
, 2012
"... We study the longstanding open problem of giving ∀Σ b 1 separations for fragments of bounded arithmetic in the relativized setting. Rather than considering the usual fragments defined by the amount of induction they allow, we study Jeˇrábek’s theories for approximate counting and their subtheories. ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
We study the longstanding open problem of giving ∀Σ b 1 separations for fragments of bounded arithmetic in the relativized setting. Rather than considering the usual fragments defined by the amount of induction they allow, we study Jeˇrábek’s theories for approximate counting and their subtheories. We show that the ∀Σ b 1 Herbrandized ordering principle is unprovable in a fragment of bounded arithmetic that includes the injective weak pigeonhole principle for polynomial time functions, and also in a fragment that includes the surjective weak pigeonhole principle for FP NP functions. We further give new propositional translations, in terms of random resolution refutations, for the consequences of T 1 2 augmented with the surjective weak pigeonhole principle for polynomial time functions.
Approximate counting by hashing in bounded arithmetic
, 2008
"... We show how to formalize approximate counting via hash functions in subsystems of bounded arithmetic, using variants of the weak pigeonhole principle. We discuss several applications, including a proof of the tournament principle, and an improvement on the known relationship of the collapse of the b ..."
Abstract
 Add to MetaCart
We show how to formalize approximate counting via hash functions in subsystems of bounded arithmetic, using variants of the weak pigeonhole principle. We discuss several applications, including a proof of the tournament principle, and an improvement on the known relationship of the collapse of the bounded arithmetic hierarchy to the collapse of the polynomialtime hierarchy.
I of M A T H E M
, 2008
"... We show how to formalize approximate counting via hash functions in subsystems of bounded arithmetic, using variants of the weak pigeonhole principle. We discuss several applications, including a proof of the tournament principle, and an improvement on the known relationship of the collapse of the b ..."
Abstract
 Add to MetaCart
We show how to formalize approximate counting via hash functions in subsystems of bounded arithmetic, using variants of the weak pigeonhole principle. We discuss several applications, including a proof of the tournament principle, and an improvement on the known relationship of the collapse of the bounded arithmetic hierarchy to the collapse of the polynomialtime hierarchy. 1