Polynomial-time Algorithms from Ineffective Proofs
نویسنده
چکیده
We present a constructive procedure for extracting polynomial-time realizers from ineffective proofs of Π2theorems in feasible analysis. By ineffective proof we mean a proof which involves the non-computational principle weak König’s lemma WKL, and by feasible analysis we mean Cook and Urquhart’s system CPV plus quantifierfree choice QF-AC. We shall also discuss the relation between the system CPV+QF-AC and Ferreira’s base theory for feasible analysis BTFA, for which Π2-conservation of WKL has been non-constructively proven. This paper treats the case of weak König’s lemma for trees defined by Π1formulas. Illustrating the applicability of CPV + QF-AC extended with this form of weak König’s lemma, we indicate how to formalize the proof of the Heine/Borel covering lemma in this system. The main techniques used in the paper are Gödel’s functional interpretation and a novel form of binary bar recursion.
منابع مشابه
Proof Mining in Subsystems of Analysis
This dissertation studies the use of methods of proof theory in extracting new information from proofs in subsystems of classical analysis. We focus mainly on ineffective proofs, i.e. proofs which make use of ineffective principles ranging from weak König’s lemma to full comprehension. The main contributions of the dissertation can be divided into four parts: (1) A discussion of how monotone fu...
متن کاملA Unified Approach for Design of Lp Polynomial Algorithms
By summarizing Khachiyan's algorithm and Karmarkar's algorithm forlinear program (LP) a unified methodology for the design of polynomial-time algorithms for LP is presented in this paper. A key concept is the so-called extended binary search (EBS) algorithm introduced by the author. It is used as a unified model to analyze the complexities of the existing modem LP algorithms and possibly, help ...
متن کاملWriting Constructive Proofs Yielding Efficient Extracted Programs
The NuPRL system [3] was designed for interactive writing of machine–checked constructive proofs and for extracting algorithms from the proofs. The extracted algorithms are guaranteed to be correct 1 which makes it possible to use NuPRL as a programming language with built-in verification[1,5,7,8,9,10]. However it turned out that proofs written without algorithmic efficiency in mind often produ...
متن کاملTenacity and some other Parameters of Interval Graphs can be computed in polynomial time
In general, computation of graph vulnerability parameters is NP-complete. In past, some algorithms were introduced to prove that computation of toughness, scattering number, integrity and weighted integrity parameters of interval graphs are polynomial. In this paper, two different vulnerability parameters of graphs, tenacity and rupture degree are defined. In general, computing the tenacity o...
متن کاملCircular (Yet Sound) Proofs
We introduce a new way of composing proofs in rule-based proof systems that generalizes tree-like and dag-like proofs. In the new definition, proofs are directed graphs of derived formulas, in which cycles are allowed as long as every formula is derived at least as many times as it is required as a premise. We call such proofs circular. We show that, for all sets of standard inference rules, ci...
متن کامل