Abstract
We introduce four recursion schemes, which, operating on a tree-like data structure, capture different models of computation based on alternating bounded quantifiers. By encoding inputs as paths, we recover and expand characterizations of complexity classes between deterministic linear time and polynomial space; by encoding them as balanced trees, we recover characterizations of alternating logarithmic time and polylogarithmic space.
We propose recursion-theoretic characterizations of logarithmic and polylogarithmic time, as defined via Turing machines with random access to the input, and show that the classes of functions obtained capture, at least, the desired classes, and, at most, their alternating versions.
Should the proposed characterizations be precise, we show that characterizations of linear and polynomially bounded alternating classes can be adapted to alternating classes with logarithmic and polylogarithmic resource bounds, simply by changing the way in which inputs are encoded. We discuss how, from these characterizations, some open problems in complexity theory can be obtained from known results by making alterations to recursion schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
This idea can be formalized quite elegantly through term rewriting systems.
- 3.
For example, recursion over \((0*1)*(0*0)\) will take two recursive steps, whereas over \(0*1*0*0\) it will take three, even though both inputs have the same length.
- 4.
\(\texttt {qAC}^0\) is the class of languages recognizable by circuit families of constant depth and (quasi-polynomial) size \(2^{\log (n)^{\mathcal {O}(1)}}\).
- 5.
- 6.
For example, suppose that 01 is written on the query tape to recover the 1st digit in the word 0100 (recall that we start the count at 0). The 0 indicates that the symbol is on the left half of the word and the 1 that it is on the right half of the subtree obtained.
References
Barrington, D.A.M.: Quasipolynomial size circuit classes. In: 1992 Seventh Annual Structure in Complexity Theory Conference, pp. 86–87. IEEE Computer Society (1992)
Barrington, D.A.M., Immerman, N., Straubing, H.: On uniformity within NC\({}^1\). J. Comput. Syst. Sci. 41(3), 274–306 (1990)
Bellantoni, S., Cook, S.: A new recursion-theoretic characterization of the polytime functions. In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, pp. 283–293 (1992)
Bellantoni, S., Oitavem, I.: Separating NC along the \(\delta \) axis. Theor. Comput. Sci. 318(1–2), 57–78 (2004)
Bel’tyukov, A.P.: A machine description and the hierarchy of initial Grzegorczyk classes. J. Sov. Math. 20, 2280–2289 (1982)
Bloch, S.: Alternating function classes within P. Technical report, University of Manitoba Computer Science Department (1992)
Bloch, S.: Functional characterizations of uniform log-depth and polylog-depth circuit families. In: Computational Complexity Conference, pp. 193–206. Citeseer (1992)
Buss, S.R.: The graph of multiplication is equivalent to counting. Inf. Process. Lett. 41(4), 199–201 (1992)
Chandra, A.K., Kozen, D.C., Stockmeyer, L.J.: Alternation. J. ACM 28(1), 114–133 (1981)
Clote, P.: Sequential, machine-independent characterizations of the parallel complexity classes AlogTIME, \(AC^k\), \(NC^k\) and NC, pp. 49–69. Birkhäuser Boston, Boston, MA (1990)
Clote, P.: Nondeterministic stack register machines. Theor. Comput. Sci. 178(1–2), 37–76 (1997)
Clote, P.: Computation models and function algebras. In: Studies in Logic and the Foundations of Mathematics, vol. 140, pp. 589–681. Elsevier (1999)
Ferrarotti, F., González, S., Schewe, K.-D., Turull-Torres, J.M.: Proper hierarchies in polylogarithmic time and absence of complete problems. In: Herzig, A., Kontinen, J. (eds.) FoIKS 2020. LNCS, vol. 12012, pp. 90–105. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39951-1_6
Ferrarotti, F., González, S., Schewe, K.D., Turull-Torres, J.M.: The polylog-time hierarchy captured by restricted second-order logic. In: 2018 20th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 133–140. IEEE (2018)
Ferrarotti, F., González, S., Torres, J.M.T., Van den Bussche, J., Virtema, J.: Descriptive complexity of deterministic polylogarithmic time and space. J. Comput. Syst. Sci. 119, 145–163 (2021)
Leivant, D.: A foundational delineation of computational feasibility. In: Proceedings 1991 Sixth Annual IEEE Symposium on Logic in Computer Science, pp. 2–11. IEEE Computer Society (1991)
Leivant, D.: A characterization of NC by tree recurrence. In: Proceedings 39th Annual Symposium on Foundations of Computer Science, pp. 716–724. IEEE (1998)
Oitavem, I.: Characterizing PSPACE with pointers. Math. Log. Q. 54(3), 323–329 (2008)
Oitavem, I.: A recursion-theoretic approach to NP. Ann. Pure Appl. Log. 162(8), 661–666 (2011)
Oitavem, I.: The polynomial hierarchy of functions and its levels. Theor. Comput. Sci. 900, 25–34 (2022)
Paul, W.J., Pippenger, N., Szemeredi, E., Trotter, W.T.: On determinism versus non-determinism and related problems. In: 24th Annual Symposium on Foundations of Computer Science (SFCS 1983), pp. 429–438 (1983)
Regan, K.W., Vollmer, H.: Gap-languages and log-time complexity classes. Theor. Comput. Sci. 188(1), 101–116 (1997)
Simmons, H.: The realm of primitive recursion. Arch. Math. Log. 27(2), 177–188 (1988)
Sipser, M.: Borel sets and circuit complexity. In: Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, pp. 61–69 (1983)
Smullyan, R.M.: Theory of Formal Systems. Princeton University Press, Princeton (1961)
Wrathall, C.: Rudimentary predicates and relative computation. SIAM J. Comput. 7(2), 194–209 (1978)
Acknowledgments
This work was funded by national funds through the FCT – Fundação para a Ciência e a Tecnologia, I.P., under the scope of the projects UIDB/00297/2020 (https://doi.org/10.54499/UIDB/00297/2020) and UIDP/00297/2020 (https://doi.org/10.54499/UIDP/00297/2020) (Center for Mathematics and Applications) and the FCT scholarship, reference 2022.10596.BD.
I am grateful to Isabel Oitavem for many helpful comments and to the anonymous referees for their suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Disclosure of Interests
The author has no competing interests to declare that are relevant to the content of this article.
Appendix
Appendix
We have used the work of Bloch, in [6], to justify the lower bound for our characterization of LIN (Theorem 1), and in [7], to justify the upper bound for our characterization of ALOG and POLYLOGSPACE. In this Appendix, we discuss the relationship between our setting and his, to facilitate the comparison between the two perspectives.
Regarding LIN, all the base functions in Definition 7 of [6] have a corresponding function in our Definition 1, when inputs are encoded as paths. For example, the function Half\((;x) = \lfloor \frac{x}{2}\rfloor \) there corresponds to our L, when inputs are encoded as paths. The difference then is that Bloch uses simultaneous recursion instead of our regular recursion scheme. However, since we have \(*\), L and R as initial functions, we can replace a system of equations defining \(f_1,\dots ,f_k\) by a single recursion scheme, defining \(f = f_1*\dots *f_k\) with a step function which uses L and R to extract each \(f_i\) from \(f_1*\dots *f_k\), applies to it its respective step function, and encodes the result again.
Regarding ALOG and POLYLOGSPACE, rewriting from our tree-like data structure to binary inputs, all the functions from our Definition 1 are in the base class of [7] (Definition 1 there). For example, when inputs are encoded as balanced trees, our \(*\) corresponds to the concatenation function and our \(\textsf{L}\) and \(\textsf{R}\) to the “front half” and “back half” functions. Definitions 6 and 7 of [7] contain the schemes of safe and very safe divide and conquer recursion, which allow a function to call itself on the back and front halves of the input word. In our data structure, this corresponds to, without a path parameter, allowing a function on input \(u*v\) to call itself on input u and v, which generalizes our path-recursion schemes, where the function has to choose which path to follow. This means that, when inputs are encoded as balanced trees, our schemes pSR and vpSR can be simulated by the respective safe and very safe forms of divide and conquer recursion. Thus, our classes \([\mathcal {I};\textsf{SC},\textsf{vpSR}]\) and \([\mathcal {I};\textsf{SC},\textsf{pSR}]\) characterize, at most, ALOG and APOLYLOG, respectively (Theorems 14 and 24 of [7]). As AR introduces only the power of alternation in a class (see Theorem 4), and ALOG and APOLYLOG are already alternating classes, we get that \([\mathcal {I};\textsf{SC},\textsf{vpSR},\textsf{AR}]\) and \([\mathcal {I};\textsf{SC},\textsf{pSR},\textsf{AR}]\) also characterize, at most, ALOG and APOLYLOG, respectively, which is the desired upper bound.
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Skapinakis, E. (2024). Recursion-Theoretic Alternation. In: Levy Patey, L., Pimentel, E., Galeotti, L., Manea, F. (eds) Twenty Years of Theoretical and Practical Synergies. CiE 2024. Lecture Notes in Computer Science, vol 14773. Springer, Cham. https://doi.org/10.1007/978-3-031-64309-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-031-64309-5_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-64308-8
Online ISBN: 978-3-031-64309-5
eBook Packages: Computer ScienceComputer Science (R0)