On the Complexity of Worst Case and Expected Time in a Circuit

نویسندگان

  • Andreas Jakoby
  • Christian Schindelhauer
چکیده

The computational delay of a circuit can be described by the natural concept of time Jakoby et al. STOC94]. We show that for a given input x and circuit C the computation of timeC(x) is P-complete. Moreover, we show that it is NP-complete to decide whether there exists an input x such that timeC(x) t for a given time bound t. We introduce the notion of worst time of a circuit and show that to decide whether a given time bound is the worst time of a circuit is BH2-complete. We also prove that the computation of an arbitrary worst case input is FP NP tt-hard, whereas the search of the lexicographically minimal worst case input is FP NP-complete and of the lex. middle worst case input is FP #P-complete. Computation of the expected time E D (timeC) of a circuit C with respect to a distribution D generated by circuit D is #P-complete under metric reducibility. Nevertheless we show that a polynomial time bounded probabilistic Turing machine approximates E D (timeC) up to an arbitrary additive constant with high probability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

Medizinische Universitt at L Ubeck 1 Malign Distributions for Average Case Circuit Complexity

In contrast to machine models like Turing machines or random access machines, circuits are a rigid computational model. The internal information ow of a computation is xed in advance, independent of the actual input. Therefore, in complexity theory only worst case complexity measures have been used to analyse this model. In JRS 94] we have deened an average case measure for the time complexity ...

متن کامل

Malign Distributions for Average Case Circuit Complexity

In contrast to machine models like Turing machines or random access machines, circuits are a static computational model. The internal information ow of a computation is xed in advance, independent of the actual input. Therefore, the size and the depth are natural and simple measures for circuits and provide a worst case measure. We consider a model where an internal gate can be evaluated when t...

متن کامل

Tight Bounds on Expected Time to Add Correctly and Add Mostly Correctly

We consider the problem of adding two n-bit numbers which are chosen independently and uniformly at random where the adder is a circuit of AND, OR, and NOT gates of fan-in two. The fastest currently known worst-case adder has running time logn +O( p logn) [Khr]. We rst present a circuit which adds at least 1 fraction of pairs of numbers correctly and has running time log log ( n ) +O( p log log...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996