On the Power of Number-Theoretic Operations with Respect to Counting

نویسندگان

  • Ulrich Hertrampf
  • Heribert Vollmer
  • Klaus W. Wagner
چکیده

We investigate function classes h#Pi f which are deened as the closure of #P under the operation f and a set of known closure properties of #P, e.g. summa-tion over an exponential range. First, we examine operations f under which #P is closed (i.e., h#Pi f = #P) in every relativization. We obtain the following complete characterization of these operations: #P is closed under f in every rela-tivization if and only if f is a nite sum of binomial coeecients over constants. Second, we characterize operations f with respect to their power in the counting context in the unrela-tivized case. For closure properties f of #P, we have h#Pi f = #P. The other end of the range is marked by operations f for which h#Pi f corresponds to the counting hierarchy. We call these operations counting hard and give general criteria for hardness. For many operations f we show that h#Pi f corresponds to some subclass C of the counting hierarchy. This will then imply that #P is closed under f if and only if UP = C; and on the other hand, f is counting hard if and only if C contains the counting hierarchy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A module theoretic approach to‎ ‎zero-divisor graph with respect to (first) dual

Let $M$ be an $R$-module and $0 neq fin M^*={rm Hom}(M,R)$. We associate an undirected graph $gf$ to $M$ in which non-zero elements $x$ and $y$ of $M$ are adjacent provided that $xf(y)=0$ or $yf(x)=0$. Weobserve that over a commutative ring $R$, $gf$ is connected anddiam$(gf)leq 3$. Moreover, if $Gamma (M)$ contains a cycle,then $mbox{gr}(gf)leq 4$. Furthermore if $|gf|geq 1$, then$gf$ is finit...

متن کامل

A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...

متن کامل

A Game Theoretic Approach for Sustainable Power Systems Planning in Transition

Intensified industrialization in developing countries has recently resulted in huge electric power demand growth; however, electricity generation in these countries is still heavily reliant on inefficient and traditional non-renewable technologies. In this paper, we develop an integrated game-theoretic model for effective power systems planning thorough balancing between supply and demand for e...

متن کامل

Topics on the Ratliff-Rush Closure of an Ideal

Introduction Let  be a Noetherian ring with unity and    be a regular ideal of , that is,  contains a nonzerodivisor. Let . Then . The :union: of this family, , is an interesting ideal first studied by Ratliff and Rush in [15]. ‎  The Ratliff-Rush closure of  ‎ is defined by‎ . ‎ A regular ideal  for which ‎‎ is called Ratliff-Rush ideal.‎‏‎ ‎ The present paper, reviews some of the known prop...

متن کامل

Conduction and Dead-Time Voltage Drops Estimation of Asymmetric Cascaded H-Bridge Converters Utilizing Level-Shifted PWM Scheme

Linear AC power supplies can be replaced by their nonlinear switching counterparts due to the lower voltage drops and higher efficiency and power density of switching-mode inverters. Multilevel cascaded H-bridge (CHB) converters are the preferred inverter structure because of modular configuration, control, and protection. The output voltage quality in CHB converters depends on the number of ou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995