Logical and Complexity-theoretic Aspects of Models of Computation with Restricted Access to Arrays
نویسنده
چکیده
We study a class of program schemes, NPSB, in which, aside from basic assignments, nondeterministic guessing and while loops, we have access to arrays; but where these arrays are binary write-once in that they are initialized to ‘zero’ and can only ever be set to ‘one’. We show, amongst other results, that: NPSB can be realized as a vectorized Lindström logic; there are problems accepted by program schemes of NPSB that are not definable in the bounded-variable infinitary logic L ∞ω; all problems accepted by the program schemes of NPSB have asymptotic probability 1; and on ordered structures, NPSB captures the complexity class L. We give equivalences (on the class of all finite structures) of the complexity-theoretic question ‘Does NP equal PSPACE?’, where the logics and classes of program schemes involved in the equivalent statements define or accept only problems with asymptotic probability 0 or 1 and so do not cover many computationally trivial problems. The class of program schemes NPSB is actually the union of an infinite hierarchy of classes of program schemes. Finally, when we amend the semantics of our program schemes slightly, we find that the classes of the resulting hierarchy capture the complexity classes Σpi (where i ≥ 2) of the Polynomial Hierarchy PH. keywords: finite model theory; descriptive complexity; program schemes.
منابع مشابه
Application of variational iteration method for solving singular two point boundary value problem
DEA methodology allows DMUs to select the weights freely, so in the optimalsolution we may see many zeros in the optimal weight. to overcome this prob-lem, there are some methods, but they are not suitable for evaluating DMUswith fuzzy data. In this paper, we propose a new method for solving fuzzyDEA models with restricted multipliers with less computation, and comparethis method with Liu''''''...
متن کاملProfiles of covering arrays of strength two
Covering arrays of strength two have been widely studied as combinatorial models of software interaction test suites for pairwise testing. While numerous algorithmic techniques have been developed for the generation of covering arrays with few columns (factors), the construction of covering arrays with many factors and few tests by these techniques is problematic. Random generation techniques c...
متن کاملAdaptive beamforming in row-column addressed arrays for 3D ultrasound imaging
In recent years, to reduce the complexity of implementation, the use of 2D arrays with restricted row-column addressing has been considered for 3D ultrasound imaging. In this paper, two methods of adaptive beamforming based on the minimum variance method are represented in such a way that the computational load is much less than using the full adaptive beamforming method. In both proposed metho...
متن کاملModeling gene regulatory networks: Classical models, optimal perturbation for identification of network
Deep understanding of molecular biology has allowed emergence of new technologies like DNA decryption. On the other hand, advancements of molecular biology have made manipulation of genetic systems simpler than ever; this promises extraordinary progress in biological, medical and biotechnological applications. This is not an unrealistic goal since genes which are regulated by gene regulatory ...
متن کاملLogical Deenability versus Computational Complexity: Another Equivalence
We examine two diierent classes of program schemes involving arrays, one class, NPSA(1), allowing arrays in their full generality and the other, NPSB(1), only allowing arrays in a (syntactically) restricted form. Our main result is that the open question of whether the complexity class PSPACE is equal to the complexity class NP is equivalent to whether the class of problems (accepted by the pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Log. Comput.
دوره 19 شماره
صفحات -
تاریخ انتشار 2009