Skip to main content

Recursion Schemata for NCk

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5213))

Abstract

We give a recursion-theoretic characterization of the complexity classes NCk for k ≥ 1. In the spirit of implicit computational complexity, it uses no explicit bounds in the recursion and also no separation of variables is needed. It is based on three recursion schemes, one corresponds to time (time iteration), one to space allocation (explicit structural recursion) and one to internal computations (mutual in place recursion). This is, to our knowledge, the first exact characterization of NCk by function algebra over infinite domains in implicit complexity.

Research supported by the project Teorias e linguagens de programação para computações com recursos limitados within the Programa PESSOA 2005/2006 of GRICES - EGIDE and partly by the FCT project POCI/MAT/61720/2004 and by DM, FCT-UNL.This work was complete while the first author visited CMAF, Universidade de Lisboa, and the support of the visit is gratefully acknowledged.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aspinall, D., Beringer, L., Hofmann, M., Loidl, H.-W., Momigliano, A.: A program logic for resources. Theor. Comput. Sci. 389(3), 411–445 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  2. Balcázar, J.L., Díaz, J., Gabarró, J.: Structural complexity II. EATCS Monographs of Theoretical Computer Science, vol. 22. Springer, Heidelberg (1990)

    MATH  Google Scholar 

  3. Bellantoni, S., Cook, S.: A new recursion-theoretic characterization of the poly-time functions. Computational Complexity 2, 97–110 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  4. Bellantoni, S., Oitavem, I.: Separating NC along the δ axis. Theoretical Computer Science 318, 57–78 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  5. Bonfante, G., Kahle, R., Marion, J.-Y., Oitavem, I.: Towards an implicit characterization of NC k. In: Ésik, Z. (ed.) CSL 2006. LNCS, vol. 4207, pp. 212–224. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Bonfante, G., Marion, J.-Y., Péchoux, R.: A characterization of alternating log time by first order functional programs. In: Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS (LNAI), vol. 4246, pp. 90–104. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Chandra, A.K., Kožen, D.J., Stockmeyer, L.J.: Alternation. Journal ACM 28, 114–133 (1981)

    Article  MATH  Google Scholar 

  8. Girard, J.-Y.: Light linear logic. Information and Computation 143(2), 175–204 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  9. Immerman, N.: Descriptive Complexity. Springer, Heidelberg (1998)

    Google Scholar 

  10. Kristiansen, L., Jones, N.D.: The flow of data and the complexity of algorithms. In: Cooper, S.B., Löwe, B., Torenvliet, L. (eds.) CiE 2005. LNCS, vol. 3526, pp. 263–274. Springer, Heidelberg (2005)

    Google Scholar 

  11. Leivant, D.: A foundational delineation of computational feasiblity. In: Proceedings of the Sixth IEEE Symposium on Logic in Computer Science (LICS 1991) (1991)

    Google Scholar 

  12. Leivant, D.: Predicative recurrence and computational complexity I: Word recurrence and poly-time. In: Clote, P., Remmel, J. (eds.) Feasible Mathematics II, pp. 320–343. Birkhäuser, Basel (1994)

    Google Scholar 

  13. Leivant, D.: A characterization of NC by tree recurrence. In: Foundations of Computer Science 1998, pp. 716–724. IEEE Computer Society, Los Alamitos (1998)

    Google Scholar 

  14. Leivant, D., Marion, J.-Y.: A characterization of alternating log time by ramified recurrence. Theoretical Computer Science 236(1–2), 192–208 (2000)

    MathSciNet  Google Scholar 

  15. Marion, J.-Y.: Predicative analysis of feasibility and diagonalization. In: Della Rocca, S.R. (ed.) TLCA 2007. LNCS, vol. 4583, pp. 290–304. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. Niggl, K.-H., Wunderlich, H.: Certifying polynomial time and linear/polynomial space for imperative programs. SIAM J. Comput. 35(5), 1122–1147 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  17. Oitavem, I.: Characterizing NC with tier 0 pointers. Mathematical Logic Quarterly 50, 9–17 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  18. Ruzzo, W.L.: On uniform circuit complexity. Journal of Computer and System Sciences 22, 365–383 (1981)

    Article  MATH  MathSciNet  Google Scholar 

  19. Simmons, H.: The realm of primitive recursion. Archive for Mathematical Logic 27, 177–188 (1988)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Michael Kaminski Simone Martini

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bonfante, G., Kahle, R., Marion, JY., Oitavem, I. (2008). Recursion Schemata for NCk . In: Kaminski, M., Martini, S. (eds) Computer Science Logic. CSL 2008. Lecture Notes in Computer Science, vol 5213. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87531-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87531-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87530-7

  • Online ISBN: 978-3-540-87531-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics