Some Relations between Classes of Low Computational Complexity

نویسندگان

  • R. O. GANDY
  • Ernst Specker
چکیده

Evidently F is 1-bounded (respectively 2-bounded) if F(x1,..., xm) is bounded for all x1, . . . ,xm by a linear (respectively a polynomial) function of Max{xl 5. . . , xm}. We shall prove that if a 0-bounded function can be defined using 2-bounded primitive recursion it can also be defined using simultaneous 0-bounded recursions. By a class %> of number-theoretic functions we shall always mean a collection which contains the successor function, the case function C {Cxyuv = x if u = v, Cxyuv = y\fu^v) and which is closed under explicit definition. #„. denotes the set of relations whose characteristic functions are in 6. In [2] Grzegorczyk introduced the hierarchy S of primitive recursive functions. For n = 0 , 1 , 2, S is, roughly speaking, the smallest class closed under n-bounded recursion. This statement becomes exact if we enlarge S° to the class S by adding Max {xj, x2} as an initial function. It is an idiosyncracy of Grzegorczyk's definition that M a x ^ 0 ; thus S° is not a class. But S° and S' contain the same relations:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Framework for Building an Efficient Incremental Intrusion Detection System

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

Real Recursive Functions and Baire Classes

Recursive functions over the reals [6] have been considered, first as a model of analog computation, and second to obtain analog characterizations of classical computational complexity classes [2]. However, one of the operators introduced in the seminal paper by Cris Moore (in 1996), the minimalization operator, creates some difficulties: (a) although differential recursion (the analog counterp...

متن کامل

Computational Complexity of Two-Dimensional Regions

The computational complexity of bounded sets of the two-dimensional plane is studied in the discrete computational model. We introduce four notions of polynomial-time computable sets in R and study their relationship. The computational complexity of the winding number problem, the membership problem, the distance problem and the area problem is characterized by the relations between discrete co...

متن کامل

A Structured View on Weighted Counting with Relations to Quantum Computation and Applications

Weighted counting problems are a natural generalization of counting problems where a weight is associated with every computational path and the goal is to compute the sum of the weights of all paths (instead of computing the number of accepting paths). We present a structured view on weighted counting by defining several classes that depend on the range of the function that assigns weights to p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1984