Results 1  10
of
29
Notes on Polynomially Bounded Arithmetic
"... We characterize the collapse of Buss' bounded arithmetic in terms of the provable collapse of the polynomial time hierarchy. We include also some general modeltheoretical investigations on fragments of bounded arithmetic. Contents 0 Introduction and motivation. 1 1 Preliminaries. 3 1.1 The p ..."
Abstract

Cited by 60 (1 self)
 Add to MetaCart
We characterize the collapse of Buss' bounded arithmetic in terms of the provable collapse of the polynomial time hierarchy. We include also some general modeltheoretical investigations on fragments of bounded arithmetic. Contents 0 Introduction and motivation. 1 1 Preliminaries. 3 1.1 The polynomially bounded hierarchy. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 4 1.2 The axioms of secondorder bounded arithmetic. : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 1.3 Rudimentary functions. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 1.4 Other fragments. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 6 1.5 Polynomial time computable functions. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 7 1.6 Relations among fragments. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 8 1.7 Relations with Buss' bounded arithmetic. : : : :...
An Application of Boolean Complexity to Separation Problems in Bounded Arithmetic
 PROC. LONDON MATH. SOCIETY
, 1994
"... We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial ..."
Abstract

Cited by 57 (15 self)
 Add to MetaCart
We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial local search (PLS) problems.
Lower Bounds to the Size of ConstantDepth Propositional Proofs
, 1994
"... 1 LK is a natural modification of Gentzen sequent calculus for propositional logic with connectives : and V ; W (both of unbounded arity). Then for every d 0 and n 2, there is a set T d n of depth d sequents of total size O(n 3+d ) which are refutable in LK by depth d + 1 proof of size exp ..."
Abstract

Cited by 56 (7 self)
 Add to MetaCart
1 LK is a natural modification of Gentzen sequent calculus for propositional logic with connectives : and V ; W (both of unbounded arity). Then for every d 0 and n 2, there is a set T d n of depth d sequents of total size O(n 3+d ) which are refutable in LK by depth d + 1 proof of size exp(O(log 2 n)) but such that every depth d refutation must have the size at least exp(n\Omega\Gamma21 ). The sets T d n express a weaker form of the pigeonhole principle. It is a fundamental problem of mathematical logic and complexity theory whether there exists a proof system for propositional logic in which every tautology has a short proof, where the length (equivalently the size) of a proof is measured essentially by the total number of symbols in it and short means polynomial in the length of the tautology. Equivalently one can ask whether for every theory T there is another theory S (both first order and reasonably axiomatized, e.g. by schemes) having the property that if a statement...
Unprovability of Lower Bounds on the Circuit Size in Certain Fragments of Bounded Arithmetic
 IN IZVESTIYA OF THE RUSSIAN ACADEMY OF SCIENCE, MATHEMATICS
, 1995
"... We show that if strong pseudorandom generators exist then the statement “α encodes a circuit of size n (log ∗ n) for SATISFIABILITY ” is not refutable in S2 2 (α). For refutation in S1 2 (α), this is proven under the weaker assumption of the existence of generators secure against the attack by smal ..."
Abstract

Cited by 55 (6 self)
 Add to MetaCart
(Show Context)
We show that if strong pseudorandom generators exist then the statement “α encodes a circuit of size n (log ∗ n) for SATISFIABILITY ” is not refutable in S2 2 (α). For refutation in S1 2 (α), this is proven under the weaker assumption of the existence of generators secure against the attack by small depth circuits, and for another system which is strong enough to prove exponential lower bounds for constantdepth circuits, this is shown without using any unproven hardness assumptions. These results can be also viewed as direct corollaries of interpolationlike theorems for certain “split versions” of classical systems of Bounded Arithmetic introduced in this paper.
On provably disjoint NPpairs
 ELECTRONIC COLLOQUIUM ON COMPUTATIONAL COMPLEXITY
, 1994
"... In this paper we study the pairs (U; V ) of disjoint NPsets representable in a theory T of Bounded Arithmetic in the sense that T proves U " V = ;. For a large variety of theories T we exhibit a natural disjoint NPpair which is complete for the class of disjoint NPpairs representable in T ..."
Abstract

Cited by 42 (2 self)
 Add to MetaCart
In this paper we study the pairs (U; V ) of disjoint NPsets representable in a theory T of Bounded Arithmetic in the sense that T proves U " V = ;. For a large variety of theories T we exhibit a natural disjoint NPpair which is complete for the class of disjoint NPpairs representable in T . This allows us to clarify the approach to showing independence of central open questions in Boolean complexity from theories of Bounded Arithmetic initiated in [11]. Namely, in order to prove the independence result from a theory T , it is sufficient to separate the corresponding complete NPpair by a (quasi)polytime computable set. We remark that such a separation is obvious for the theory S(S 2 ) + S \Sigma 2 \Gamma PIND considered in [11], and this gives an alternative proof of the main result from that paper.
A New Proof of the Weak Pigeonhole Principle
, 2000
"... The exact complexity of the weak pigeonhole principle is an old and fundamental problem in proof complexity. Using a diagonalization argument, Paris, Wilkie and Woods [16] showed how to prove the weak pigeonhole principle with boundeddepth, quasipolynomialsize proofs. Their argument was further re ..."
Abstract

Cited by 35 (2 self)
 Add to MetaCart
The exact complexity of the weak pigeonhole principle is an old and fundamental problem in proof complexity. Using a diagonalization argument, Paris, Wilkie and Woods [16] showed how to prove the weak pigeonhole principle with boundeddepth, quasipolynomialsize proofs. Their argument was further refined by Kraj'icek [9]. In this paper, we present a new proof: we show that the the weak pigeonhole principle has quasipolynomialsize LK proofs where every formula consists of a single AND/OR of polylog fanin. Our proof is conceptually simpler than previous arguments, and is optimal with respect to depth. 1 Introduction The pigeonhole principle is a fundamental axiom of mathematics, stating that there is no onetoone mapping from m pigeons to n holes when m ? n. It expresses Department of Mathematics and Computer Science, Clarkson University, Potsdam, NY 136995815, U.S.A. alexis@clarkson.edu. Research supported by NSF grant CCR9877150. y Department of Computer Science, University o...
Theories for Complexity Classes and their Propositional Translations
 Complexity of computations and proofs
, 2004
"... We present in a uniform manner simple twosorted theories corresponding to each of eight complexity classes between AC and P. We present simple translations between these theories and systems of the quanti ed propositional calculus. ..."
Abstract

Cited by 33 (7 self)
 Add to MetaCart
(Show Context)
We present in a uniform manner simple twosorted theories corresponding to each of eight complexity classes between AC and P. We present simple translations between these theories and systems of the quanti ed propositional calculus.
Structure and Definability in General Bounded Arithmetic Theories
, 1999
"... This paper is motivated by the questions: what are the \Sigma ..."
Abstract

Cited by 21 (6 self)
 Add to MetaCart
(Show Context)
This paper is motivated by the questions: what are the \Sigma
Quantified Propositional Calculus and a SecondOrder Theory for NC¹
, 2004
"... Let H be a proof system for the quantified propositional calculus (QPC). We j witnessing problem for H to be: given a prenex S j formula A, an Hproof of A, and a truth assignment to the free variables in A, find a witness for the outermost existential quantifiers in A. We point out that the S ..."
Abstract

Cited by 14 (3 self)
 Add to MetaCart
Let H be a proof system for the quantified propositional calculus (QPC). We j witnessing problem for H to be: given a prenex S j formula A, an Hproof of A, and a truth assignment to the free variables in A, find a witness for the outermost existential quantifiers in A. We point out that the S witnessing problems for the systems G 1 and G 1 are complete for polynomial time and PLS (polynomial local search), respectively. We introduce