Measure One Results in Computational Complexity Theory1
نویسندگان
چکیده
Starting with Bennet and Gill’s seminal paper [13] a whole new research line in complexity theory was opened: the examination of relativized complexity theoretic statements which hold for a measure one set of oracles in the measure defined by putting each string into the oracle with probability 12 independent of all other strings (a formal definition is given below). Bennet and Gill were concerned with the subtlety of the P ? = NP question pointed out in a paper by Baker, Gill, and Solovay [8] where oracles A and B were exhibited such that PA = NPA but PB 6= NPB. However since these two oracles are of a very “intentional nature” [59], Bennet and Gill wanted to examine the relation between P and NP relative to an oracle which is produced “at random.” They showed that PA 6= NPA for a measure one set of oracles A. In their own words: “Relative to a random oracle A, PA 6= NPA 6= coNPA with probability 1” [13]. Since then results of this form have been called “random oracle results” in complexity theory. What we want to point out here is that this term does not refer to algorithmically random languages in the sense of Martin-Löf [65]. To avoid confusion, results as the one by Bennet and Gill should better be referred to as “measure one results”. This however does not deny that there are certain relations among measure one oracle sets and the set of algorithmically random oracles as will be pointed out in the next section. Though there are a lot of beautiful and compelling results along this line the status of measure one oracle sets, especially in connection with the so called Random Oracle Hypothesis, is still unclear. This hypothesis, as stated by Bennett and Gill, claims that every statement holding for a measure one set of oracles also holds in the unrelativized world. In the meantime however it turned out that this does not hold. What we will show is that even a much more restricted formulation of the hypothesis is false.
منابع مشابه
On the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملFast Least Square Matching
Least square matching (LSM) is one of the most accurate image matching methods in photogrammetry and remote sensing. The main disadvantage of the LSM is its high computational complexity due to large size of observation equations. To address this problem, in this paper a novel method, called fast least square matching (FLSM) is being presented. The main idea of the proposed FLSM is decreasing t...
متن کاملMeasurement of Complexity and Comprehension of a Program Through a Cognitive Approach
The inherent complexity of the software systems creates problems in the software engineering industry. Numerous techniques have been designed to comprehend the fundamental characteristics of software systems. To understand the software, it is necessary to know about the complexity level of the source code. Cognitive informatics perform an important role for better understanding the complexity o...
متن کاملReduction of Computational Complexity in Finite State Automata Explosion of Networked System Diagnosis (RESEARCH NOTE)
This research puts forward rough finite state automata which have been represented by two variants of BDD called ROBDD and ZBDD. The proposed structures have been used in networked system diagnosis and can overcome cominatorial explosion. In implementation the CUDD - Colorado University Decision Diagrams package is used. A mathematical proof for claimed complexity are provided which shows ZBDD ...
متن کاملImproved Content Aware Image Retargeting Using Strip Partitioning
Based on rapid upsurge in the demand and usage of electronic media devices such as tablets, smart phones, laptops, personal computers, etc. and its different display specifications including the size and shapes, image retargeting became one of the key components of communication technology and internet. The existing techniques in image resizing cannot save the most valuable information of image...
متن کامل