The Computational Complexity of the Bounded Halting Problem
نویسنده
چکیده
Proof: If a deterministic Turing machine T decides language BHP by computing the first n steps of each of the possible computation paths of the nondeterministic Turing machine Mi applied to x, then the worst-case running-time of T must be exponential, since Mi applied to x may have a choice of an exponential number of computation paths. So if T is to decide language BHP and still run in polynomial-time, T cannot always compute the first n steps of all of the possible computation paths of Mi applied to x. But since the first n steps of all of the possible computation paths of Mi applied to x completely determine whether Mi accepts x within n steps, in order for T to decide language BHP, it is still necessary for T to have access to information about the first n steps of all of the possible computation paths of Mi applied to x, even if T does not compute this information, i.e., T must have access to precomputed information about the first n steps of all but at most a polynomial number of the possible computation paths of Mi applied to x in order for T to decide language BHP and still run in polynomial-time. And such precomputed information must be finite, since if it were infinite, then T would require an infinite oracle tape, which would contradict our original assumption that T is just an ordinary deterministic Turing machine with no access to an oracle. But even if such precomputed information were finite, it could only be used to speed up the running-time of the Turing machine T by a constant amount of time (not the exponential amount of time required for T to run in polynomial-time and still decide language BHP), since such precomputed information could have just as easily been computed by T in a constant amount of time. So precomputed information is not sufficient to speed up the running-time of T to the point where T is able to determine in polynomial-time whether Mi accepts x within n steps. Therefore, there cannot exist a deterministic Turing machine T which decides language BHP in polynomial-time.
منابع مشابه
Some improvements in fuzzy turing machines
In this paper, we improve some previous definitions of fuzzy-type Turing machines to obtain degrees of accepting and rejecting in a computational manner. We apply a BFS-based search method and some level’s upper bounds to propose a computational process in calculating degrees of accepting and rejecting. Next, we introduce the class of Extended Fuzzy Turing Machines equipped with indeterminacy s...
متن کاملOn the Computational Complexity of the Domination Game
The domination game is played on an arbitrary graph $G$ by two players, Dominator and Staller. It is known that verifying whether the game domination number of a graph is bounded by a given integer $k$ is PSPACE-complete. On the other hand, it is showed in this paper that the problem can be solved for a graph $G$ in $mathcal O(Delta(G)cdot |V(G)|^k)$ time. In the special case when $k=3$ and the...
متن کاملComputational Error Complexity Classes
The complexity classes Nearly-BPP and Med DisP had been recently proposed as limits of eecient computation Yam1 96, Schi 96]. For both classes, a polynomial time bounded algorithm with bounded probabilistic error has to compute correct outputs for at least 1 ? 1 n !(1) of inputs of length n. We generalize this notion to general error probabilities and arbitrary complexity classes. For proving t...
متن کاملComputational Complexity of Functions
Below is a translation from my Russian paper. I added references, unavailable to me in Moscow. Similar results have been also given in [Schnorr Stumpf 75] (see also [Lynch 75]). Earlier relevant work (classical theorems like Compression, Speed-up, etc.) was done in [Tseitin 56, Rabin 59, Hartmanis Stearns 65, Blum 67, Trakhtenbrot 67, Meyer Fischer 72]. I translated only the part with the state...
متن کاملOn the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملSome Lower Bounds in Parameterized AC^0
We demonstrate some lower bounds for parameterized problems via parameterized classes corresponding to the classical AC0. Among others, we derive such a lower bound for all fptapproximations of the parameterized clique problem and for a parameterized halting problem, which recently turned out to link problems of computational complexity, descriptive complexity, and proof theory. To show the fir...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/cs/0611082 شماره
صفحات -
تاریخ انتشار 2006