Beruflich Dokumente
Kultur Dokumente
Michael Sipser*
Department of Mathematics
Massachusetts Institute of Technology
Cambridge MA 02139
When?
JURIS HARTMANIS
Among the many equivalent formulations of the P ver- Edmonds [Ed65] gave the first lucid account of the
sus NP question, the following one is particularly simple issue of brute force search appearing in western litera-
ture, The main contribution of his paper was a polyn~
to describe.
mial time algorithm for the maximum matching prob-
Is them. an algorithm which, when presented with an lem. This algorithm itself still stands ss a beautiful ex-
undimct ed graph, determines whether it contains a com- ample of how brute force can sometimes be avoided, if
plete subgraph on hay its nodes, and whose running one is clever enough. Edmonds felt the need to explain
time is bounded above by a polynomial in the number why his was a result at all, when there is an obvious
of nodes? finite algorithm for solving the problem. In so doing he
discussed the problem of brute force search in general
By the term algorithm we mean a finite set of in- as an algorithmic method.
structions on any of a number of related models of com- In the 1950s, researchers in the Soviet Union were
putation, e.g., the multi-tape Turing math inc. The aware of the issue of brute force search, called pewbor
term P, for Polynomial time, refers to the class of lan- in Russian. Yablonski ~a59a] described the issue for
guages languages decidable on a Turing machine in time general problems and focused on the specific problem
bounded above by a polynomial. It is invariant over of constructing the smallest circuit for a given function.
reasonable computational models. NP, for Nondeter-
Curiously, in a later paper ~a59b] he obscured the issue
ministic Polynomial time, refers to the analogous class by claiming to prove that perebor is unavoidable for this
for nondeterministic Turing machines. NP consists of problem. That paper, whose resin theorem makes no
those languages where membership is verijiabie in poly- reference to the notion of algorithm, certainly did not
nomial time. The question of whether P ia equal to NP do as claimed, at least in the sense we would mean it
is equivalent to whether an NP-complete problem, such
today. Trakhtenbrot sheds some light on this murky
as the clique problem described above, can be solved in
situation in his survey of early Russian work on perebor
polynomial time. The books by Hopcroft and Unman [Tr84].
[HU79] and Garey and Johnson [GJ79] contain excellent
introductions to this subject.
2.2 P and NP
604
earlier, Edmonds @d65b] captured the essence of the of languages efficiently computable in the presence of
notion of NP with his good characterization whereby that oracle, Baker, Gill, and Solovay [BGS75] demon-
an assistant can convince his supervisor of the solution strated an oracle relative to which P is equal to NP
to a problem. Since the solution may be either positive and another relative to which they differ. A step-by-
or negative in the case of a problem involving language step simulation of one machine by another, such as that
membership, Edmondss notion is generally associated used in a conventional diagonalization, still succeeds in
with the class NP n CONP. Karp [Ka72] demonstrated the presence of an oracle, as the simulator needs only
the surprisingly wide extent of NP-completeness when query the oracle whenever the simulated machine does.
he showed that many familiar problems have this prop- Any argument which relies only on step-by-step simula-
ert y. tion to collapse or separate P and NP would thus also
apply in the presence of any oracle. As this would con-
tradict the BGS theorem, step-by-step simulation will
2.3 Explicit Conjecture
not be sufficient to settle the question.
Cook first precisely formulated the P versus NP conjec- The above is a heuristic argument as the notion of
ture in his 1971 paper. More or less close approximw step-by-step simulation) is not precisely defined. In
tions to it appeared somewhat earlier in the papers of recent papers, Lund, Fortnow, Karloff, and Nisan, and
Edmonds, Levin, Yablonski, and in Godels letter, Shamir ~FKN90,Sh90] introduced a new type of sim-
ulation to prove equivalence for the complexity clssses
1P snd PSPACE. This simulation is not of the step-by-
3 Status step sort, but is rather indirect, and indeed does not
relativize to all oracles, as can be seen from the paper
3.1 Diagonalization and Relativization of Fortnow and Sipser [FS88]. Conceivably, an indi-
Rabin [Ra60] and Hartmanis and Stearns [HS65] proved rect simulation such se this could be combined with the
the existence of decidable problems with arbitrarily high diagonalization method to separate certain complexity
605
[HH76] giving an oracle under which the P versus NP inference. Resolution is a proof system for showing that
question is independent of set theory and [Li78,DL79, formulas sxe unsatisfiable. The axioms are the clauses
Sa80,Bu86,CU88, BH91] establishing independence and of the formula. In the inference rule, if clauses (Z A a)
related results within weak fragments of number theory and (Z A /3) are already present, then the new clause
or related systems. While I do not profess expertise in (a A ~) maybe added. Unsatisfiability is proved when
this area, I doubt whether the results obtained so far in the empty clause ia derived. The complexity of the proof
this vein do more than raise the possibility of meaningful is the number of clauses added. Any unsatisfiable for-
independence. mula has a resolution proof. Haken, solving a question
that had been open for many years, proved that there
are formulas requiring exponential size proofs [Ha85].
3.3 Expressibility in Logic His work followed that of Tseitin [Ts62] who had solved
Another potential application of mathematical logic regular resolution, a further restricted form (see also
arises because it provides a different way of defining [Ga77]). Extended resolution, a generalized form, re-
familiar complexity classes. Fagin [Fa74] showed that mains open (see [C075]). Kozen [K077] considered other
NP equals the class of languages representing struc- proof systems and established lower bounds for them.
tures definable by X; second-order sentences. He and Proof systems are related to the class NP. If all
Jones and Selman [JS74] showed that the clam NEXP- unsatisfiable formulas had polynomial length resolu-
TIME equals the class of languages representing the col- tion proof% then it would easily follow that NP=coNP.
lections of cardinalities of universes of such structures. Hakens result proves a special case of the NP#coNP
Much earlier, Scholz [SC52] had considered such collec- conjecture, showing that one particular nondeterminia-
tions and asked whether they could be characterized tic algorithm is superpolynomial.
(see also Asser [As55]). Immerman [Im87] has extended
the correspondence with finite model theory to P, NL,
3.5 Circuit Complexity
and other complexity classes, using first-order calculus
adorned with various operators. Hope that this recod- Shannon [Sh49] proposed the size of Boolean circuits
ing into logic may help to settle questions in complexity as a measure of the complexity of functions. Savage
theory has been partly born out by Immermans dis- [Sa72] demonstrated a close relationship between cir-
covery ~m88] that NL=coNL, inspired by certain ob- cuit size snd time on a Turing machine. Circuits are
servations concerning first-order definability following an appealing model of computation for proving lower
an earlier weaker result of [LJK87]. Szelepcs6nyi [S288] bounds. Their relatively simple definition renders them
independently obtained NL=coNL at around the same more amenable to combinatorial analysis and allows for
time. natural variations and restrictions. This has been key
to achieving a number of important results. Mrmy re-
searchers consider circuit complexity to be the most vi-
3.4 Restricted Systems
able direction for resolving the P versus NP question.
The difficulty in proving lower bounds on complexity We will survey recent work in this area, with an eye
stems from the richness of the class of algorithms. One towards this goal. The survey paper of Boppana and
approach that allows for partial progress is to restrict Sipser [BS90] contains details of much of this work, de-
the class of algorithms considered. There is a substan- scribed in a readable fsshion. Dunne [Du88] and We-
tial literature on bounds in various restricted models. gener [We87] have recently written books on Boolean
These fall into two categories, which may be called nat- complexity.
ural models and handicapped models. In the former, a A circuit (or straight line program) over a basis (typ-
model is selected which allows only for operations spe- ically AND, OR and NOT) is a sequence of instructions,
cially tailored to the problem at hand. This includes each producing a function by applying an operation
sorting models, polynomial evaluation models, various from the bssis to previously obtained functions. Ini-
models oriented towards data structures, and others. tially, we start out with the functions naturally associ-
In the latter, we seek to maintain the generality of the ated with each of the input variables. If each function is
model, but weaken it sufficiently so that an interesting used at most once, then the circuit is called a formula.
lower bound is obtainable. Both approaches bear a con- By Savages theorem, any problem in P has a poly-
nection to separating complexity classes. We will treat nomial size family of circuits. Thus, to show that a
handicapped models shortly in the section on circuit problem is outside of P it would suffice to show that its
complexity. Here we consider restricted proof systems circuit complexity is superpolynornial. A simple count-
as a form of natural model. ing argument shows that most Boolean functions on n
A proof system is a collection of axioms and rules of variables require exponential circuit size [Sh49,Mu56].
606
The best lower bound we have to date for a problem in put in the form OR of small ANDS. This interchange
NP is 3n o(n), due to N. Blum [B184]. It does not allows adjacent levels of ORS to follow one another and
seem likely that the techniques used to get this result therefore to merge. A circuit may thus be simplified in-
will extend to significantly better bounds. ductively, while preserving the fact that it computes a
In [Va90], Valiant suggests that a direct attempt to parity function. Ajtais argument is also an induction.
prove lower bounds on the size of Boolean circuits may He showed that any set definable by a low depth circuit
not be the right approach. There are natural algebraic is well approximated by a set of a very special form, a
generalizations of certain NP-complete problems, such disjoint union of large cylinders. A cylinder is a maximal
as the Hamiltonian cycle problem, to an arbitrary ring. collection of strings which all agree on some collection
We may also generalize circuits over the bssis AND, XOR of variables. Clearly the parity function cannot be ap-
for such problems to arbitrary rings. Circuits which proximated in this way. His main combinatorial lemma
solve the generalized problem form a proper subclass of shows that the property of being well approximable is
the circuits which merely work correctly in the Boolean closed under polynomial union and intersection.
case. Aa such it may be essier to prove strong lower Yao ~a85] combined probabilistic restriction with
bounds in this restricted csse. Valiant points out that a type of approximation to give an exponential lower
our failure to do this even then argues poorly for our bound for constant depth parity circuits. H&tad [H&86]
chances in the Boolean case. He suggests directing our simplified and strengthened this bound by improving
energies toward solving the algebraic csae first. the core of the FSS argument using a type of analysis
There are merits to this line or reasoning. One of the of conditional probabilities developed by Yao.
impediments in the lower bounds area is a shortage of Sipser [Si83] showed that there are functions com-
problems of intermediate difficulty which lend insight putable by depth d linear size circuits and which require
into the harder problems. The algebraic generalizations superpolynomial size for depth d 1, by a technique very
may be important steps towards the Boolean goal. On similar to that used by FSS. Yao claimed without proof
the other hand, I do not believe, ss Valiant argues, that an exponential bound for this depth hierarchy. Using
the algebraic caze is prerequisite. True, the algebraic his simplified method, H&tad presented a proof of this
case is more restrictive, and hence easier.) The same result.
may be said for uniform models of computation ver- Razborov [Ra87] introduced a method of obtaining
sus nonuniform models. Nonuniform models, such ss lower bounds on the size of limited depth circuits over
circuits, are more powerful than uniform models, such a larger basis. He proved that the majority function re-
m Turing machines, because the algorithm used may quires exponential size for circuits having PARITY gates
change arbitrarily depending upon the length of the in- as well as AND, OR, and NOT gates. He showed that
put. Accordingly it may be more difficult to prove lower any set definable with a small, shallow circuit over this
bounds on these more powerful models. Nevertheless, basis is well approximated by a polynomial of low de-
the harder problem may allow one to see more eas- gree over the two element field, and argues that the
ily the heart of the matter, unobscured by unnecessary majority function cannot be well approximated in this
features. way. Barrington [Ba86a] extended this to circuits with
MODq gates for any prime q instead of only PARITY (i. e.,
MOD2) gates. Smolensky [Sm87] further simplified and
3.6 Bounded Depth Circuits
improved this, showing that computing the MODP func-
The next few sections treat handicapped variants of tion requires exponential size when computed by shal-
the circuit model. By placing various restrictions on low circuits having AND, OR, and MODq gates, for p and
structure, such as limiting the depth or restricting the q powers of different primes.
basis, it has been possible to obtain several strong
lower bounds. The first result of this kind is due to
3.7 Monotone Circuit Size
Furst, Saxe, and Sipser [FSS84], and independently Aj-
tai [Aj83], who proved that certain simple functions, A monotone circuit is one having AND and OR gates but
such as the parity function, require superpolynomial cir- no negations. A function is monotone if x ~ y implies
cuit size if the depth is held fixed. $(z) < ~(Y) under the usual Boolean ordering. It is
These two proofi of this theorem use different, though essy to see that monotone circuits compute exactly the
related, methods. Furst, Saxe, and Sipser introduced class of monotone functions.
the notion of probabilistic restnction, a randomly se- The first strong lower bound concerning this model
lected assignment to some of the variables. They showed is due to Razborov [Ra85a], who proved that the
that for any circuit of the form AND of small ORS, the clique function hss superpolynomial monotone complex-
circuit induced by a random restriction may likely be ity. Shortly thereafter Andreev [An85], using similar
607
methods, proved an exponential lower bound, further weaker than showing it is outside of P, but we are still
tightened by Alon and Boppana [AB87]. unable to do this for any language in NP.
Razborovs theorems on monotone and bounded Karchmer and Wigderson [KW88] gave a very nice
depth circuits, as well as the aforementioned proof of Aj- characterization of languages definable with such cir-
tai, rely upon a technique which has come to be called cuits, which may be useful in obtaining lower bounds
the approximation method. One of the difficulties in on depth. Let A be such a language. In the communi-
attempting to analyze the computation of a circuit (r* cation game for A, there are two players, one having a
stricted or general) for the purposes of proving lower string in A and the other having a string of the same
bounds is that the subfunctions computed by the cir- length not in A. The players communicate with each
cuit may be complicated and hard to grasp. In the ap- other to find a position where their two strings differ.
proximation method we show that the subfunctions are The minimum number of bits that they require to do
in a certain sense near functions which are much sim- this over all strings of length n is the complexity of the
pler. Take, for example Razborovs lower bound for the game. Karchmer and Wigderson show that this exactly
clique function. Consider any monotone circuit com- equals the minimum circuit depth necessary for this lan-
puting this function. The plan is to adjust the result guage.
of each of the AND and OR gates in such a way that A monotone variant of this game has played an im-
(1) each adjustment alters the result only slightly, while portant role in the discovery of lower bounds on mono-
(2) the adjusted output is far from the clique function. tone circuit depth. If one demands in addition that the
This means that there must have been many adjust- found position is 1 for the string in A, then the com-
ments and hence many gates. plexity of the game is the minimum monotone circuit
If general circuits computing monotone functions depth. This characterization of monotone depth com-
could be converted into monotone circuits with only a plexity led them to a Cl(logz n/ log log n) lower bound
polynomial increase in size then strong monotone lower on the monotone depth for the st-connectivity func-
bounds would yield separations of complexity classes in tion. This was subsequently improved to fl(logz n) by
general complexity theory. Razborov [Ra85b] showed Boppana ~S90] who avoided the communication game
that this is not true when he used the approximation by arguing directly on the monotone circuit (indepen-
to show that the that the problem of testing for a per- dently obtained by H&tad [unpublished]). Raz and
fect matching requires superpolynornial size monotone Wigderson [RW90] used the communication game to ob-
circuits. As this problem is in P [Ed65], we know that tain a linear depth lower bound for monotone circuits
it has polynomial size non-monotone circuits. Using a computing the matching function. Their proof uses a
simikar method, Tardos [Ta88] showed that there is a lower bound on the probabilistic communication com-
monotone problem in P which requires exponential size plexity of the set disjointness problem due to Kalyana-
monotone circuits. sundamm and Schnitger [KS87] (simplified by Razborov
There is a class of functions where the monotone and [Ra90a]). Because of this it seems that it will be diffi-
non-monotone complexities axe polynomially related. cult to phrsse the Raz-Wigderson argument without ap-
These are the slice functions, introduced by Berkowitz pealing to the communication game. Razborov [Ra90b]
[Be82]. A function ~ is a slice finction if for some k and Goldmann and Hiistad [GH89] obtained additiomd
the wdue of ~(iz) is O when the number of 1s in z is lower bounds using the communication game.
fewer than k, and the value is 1 when the number of 1s Grigni and Sipser [GS90] point out that many of
in x is more than k. He showed that any general cir- the results in monotone complexity can be viewed in
cuit computing a slice function may be converted into a terms of monotone analogs, mP, mNP, etc., of the fa-
monotone function by adding only a polynomial num- miliar complexity classes. Thus we already know that
ber of gates. Hence if one were able to prove a strong mP#mNP [Ra85a], mP# {P n mono} [Ra85b], and
lower bound on the monotone circuit complexity of a mNCl#mNL ~W88]. We use mono to designate the
slice function then this would show that P#NP. class of all monotone languages. Grigni and Sipser
demonstrate that mNL#m-coNL using the technique
of [KW88]. This shows the inherently nonmonotone
3.8 Monotone Circuit Depth
nature of the Imrnerman-Szelep cseny simulation. In
Circuits over the standard basis restricted to fan-in two a later paper [GS91], they strengthen the KW result
with O(log n) depth form an important subclass of the by separating mNCl from mL. There are a number of
polynomial size circuits. Such circuits axe equivalent in open questions in monotone complexity, for example,
power to polynomial size formulas. Proving that a lan- whether Barringtons [Ba86a] beautiful simulation of
guage is not definable with a circuit of this kind would log-depth circuits by polynomial-size, width 5, branch-
show that it is not in the class NCl. This would be ing programs, is inherently nonmonotone (see [GS90]).
6Q8
3.9 Active Research Directions cuits computing the parity function on n variables, is the
theorem that there are no countable-size, depth d, cir-
In this section we wilI examine a few directions which
cuits computing a parity function on w many variables.
appear to be plausible means of separating complex-
(A Boolean function on w many Boolean variables is a
ity classes. These are the approximation meihod, which
parity jknction if the output changes whenever any sin-
has been used successfully in analyzing restricted circuit
gle input changes.) The proof of the infinitary theorem
models; the function composition method, which may be
did precede and motivate the proof in the finite case.
useful to prove functions require large circuit depth; and
The two prootk are very similar in structure. A see;
an infinite analog, which has led to lower bounds in the
end, related application of this analogy appears in the
bounded depth circuit model.
constant-depth hierarchy theorem [Si83].
There is a possibility that the approximation method,
This same approach suggests a infinite analog to the
which has been used so successfully to obtain lower
class NP: the analytic sets (also called E; sets). The
bounds for monotone and bounded depth circuits, may
chissical theorem due to Lebesgue [Le05] stating that
apply in the general case a well. In [Ra89], Razborov
the there is an snalytic set whose complement is not
considers this question and gives both a positive and
analytic may thus be taken as an infinite analog to the
negative answer. He shows that for one formalization of
statement that NP#coNP. Lebesgues proof is a diag-
the method, it is too wesk to give interesting bounds.
onalization, and it does not seem likely that it has a
On the other hand a generalization of the method is, in
finite counterpart. In [Si84] I give a different proof of
principle, strong enough, though there are much greater
Lebesgues theorem. This new proof does not rest upon
technical difficulties when applying it. Roughly speak-
the notion of universal set, essential to the diagonaliza-
ing, these two versions of the approximation method
tion in Lebeagues proof. It offers more information of
differ in the way the class of approximating functions
a combinatorial nature that may be useful in the finite
are chosen. In the weaker version, the class is selected
case.
in advance and applies to all circuits. In the stronger
version the class depends upon the circuit.
Karchmer, Raz, and Wigderson [KRW91] proposed a
Acknowledgments
direction for investigating the NC1 versus P question.
Let B. denote the set of all Boolean functions on n
I wish to thank Mauricio Ksrchmer and Alexander
variables. Given .f c B. and g c Bm we define the
Razborov who read an earlier draft of this paper and
composition ~ o g : {O, I}nm - {O, 1} by
offered several suggestions and corrections.
609
It turns out that this number [of steps required by Edmonds, a section marked Digression in a paper
the algorithm] is a moderate power of n, i.e., consider- giving a polynomial time algorithm for the mwmum
ably smaller than the obvious estimate n! mentioned matching problem fEd65]:
earlier. An explanation is due on the use of the words effi-
cient algorithm. First, what I present is a conceptual
Yablonski, discussing alternatives to perebor in de-
description of an algorithm and not a particular formal-
signing circuits /Ya59aJ
ized algorithm or code.
At present there is an extensive field of problems For practicrd purposes computational details are vi-
in cybernetics where the existence of certain objects tal. However, my purpose is only to show as attractively
or facts may be established quite trivially and, within as I can that there is an efficient algorithm. According
the limits of the classical definition of algorithms, com- to the dictionary, efficient means (adequate in oper-
pletely effectively, yet a solution is, in practice, often ation or performance. This is roughly the meaning I
impossible because of its cumbersome nature. Such, for want in the sense that it is conceivable for maximum
example, are some of the problems involving informa- matching to have no efficient algorithm. Perhaps a bet-
tion coding and the analysis and synthesis of circuits. ter word is good.
It is here that the necessity of making the classical def- I am claiming, as a mathematical result, the existence
inition an algorithm more precise naturally arises. It is of a good algorithm for finding a maximum cardinality
to be expected that this will, to a greater extent than matching in a graph.
at present, take into account the peculiarities of cer- There is an obvious finite algorithm, but that algo-
tain classes of problems, and may, possibly, lead to such rithm increases in difllculty exponentially with the size
developments in the concept of algorithm that dii7er- of the graph. It is by no means obvious whether or not
ent types of algorithms will not be comparable. At the there exists an algorithm whose difficulty increases only
moment it is too early to make predictions of how the algebraically with the size of the graph.
notion of an algorithm may be modified, for we have, ss The mathematical significance of this paper rests
yet, very little idea of how the various classes of prob- largely on the assumption that the two preceding sen-
lems should be speciiied, In the present article we at- tences have mathematical meaning. I am not prepared
tempt to explore the algorithmic difficulties arising in to set up the machinery necessary to give them formal
the solution of cybernetic problems which, while admit- meaning, nor is the present context appropriate for do-
ting of a trivial solution, on the basis of the clsssical ing this, but I should like to explain the idea a little fur-
definition of an algorithm, are not practically solvable ther informally. It may be that since one is customarily
because of the massive nature of that solution. concerned with existence, convergence, finiteness, and
so forth, one is not inclined to take seriously the ques-
Cobham, studying why certain problems, such a mu]-
tion of the existence of a better-than-finite algorithm.
triplication, are computationally more ditlicult tlmn oth-
The relative cost, in time or whatever, of the various
ers, such as addition [C064]:
applications of a particular algorithm is a fairly clear
Thus the process of adding m and n can be carried out notion, at least ss a natural phenomenon. Presumably,
in a number of steps bounded by a linear polynomial in the notion can be formalized. Here algorithm is used
i(m) and l(n). Similarly, we can multiply m and n in a in the strict sense to mean the idealization of some phys-
number of steps bounded by a quadratic polynomial in ical machinery which gives a definite output, consisting
i(m) tmd l(n). So, too, the number of steps involved in of cost plus the desired result, for each member of a
the extraction of square roots, calculation of quotients, specified domain of inputs, the individual problems.
etc., can be bounded by polynomials in the lengths of The problem-domain of applicability for an algorithm
the numbers involved, and this seems to be a property often suggests for itself possible measures of size for the
of simple function in general. This suggests that we individual problems for maximum matching, for ex-
consider the CISSS, which I will call X, of all functions ample, the number of edges or the number of vertices
having this property. in the graph. Once a messure of problem-size is chosen,
For several reasons the class L seems a natural one to we can define FA (N) to be the lesst upper bound on
consider. For one thing, if we formalize the above def- the coat of applying algorithm A to problems of size N.
inition relative to various general classes of computing When the measure of problem-sise is reasonable and
machines we seem always to end up with the same well- when the sizes sssume values arbitrarily large, an
defined class of functions. Thus we can give a mathe- asymptotic estimate of FA (N) (let us call it the order
matical characterization of L having some confidence of dificzdty of algowthm A) is theoretically important.
that it characterizes correctly our informally defined It cannot be rigged by making the algorithm artificially
class. difficult for smaller sizes. It is one criterion showing
610
how good the algorithm ia not merely in comparison which the supervisor crm require his assistant to search
with other given algorithms for the same class of prob- out along with a tilmum partition and which the su-
lems, but also on the whole how good in comparison pervisor can then use with ease to verify with mathe-
with itself. There are, of course, other equaUy valuable matical certainty that the partition is indeed minimum.
criteria. And in practice this one is rough, one reason Having a good characterization does not mean necessar-
being that the size of a problem which would ever be ily that there is a good algorithm. The assistant may
considered is bounded. have to kill himself with work to find the information
It is plausible to assume that any algorithm is equiva- and the partition.
lent, both in the problems to which it applies and in the
Rabin, in a survey paper on automata theory fRa66]:
costs of its applications, to a normal algorithm which
decomposes into elementaJ steps of certain prescribed We shall consider an algorithm to be practical if, for
types, so that the costs of the steps of all normal algo- automata with n states, it requires at most Cnb (k is
rithms are comparable. That is, we may use something a fixed integer and c a fixed constant) computational
like Churchs thesis in logic. Then, it is possible to ask: steps. This stipulation is, admittedly, both vague and
Doea there or does there not exist an algorithm of given arbitrary. We do not, in fact cannot, define what is
order of difficulty for a given class of problems? meant by a computational step, thus have no precise
One can find many classes of problems, besides maxi- and general measure for the complexity of algorithms.
mum matching and its generalizations, which have algo- Furthermore, there is no compelling reason to classify
rithms of exponential order but seemingly none better, algorithms requiring cn~ steps as practical.
An example known to organic chemists is that of de- Several points may be raised in defense of the above
ciding whether two gjven graphs are isomorphic. For stipulation. In every given algorithm the notion of a
practical purposes the difference between algebraic and computational step is quite obvious. Hence there is not
exponential order is often more crucial than the dtier- that much vagueness about the messure of complexity of
ence between finite and non-finite. existing aJgorithma. Another significant pragmatic fact
It would be unfortunate for any rigid criterion to in- is that all existing algorithms either require up to about
hibit the practical development of algorithms which are n4 steps or else require 2n or worse steps. Thus drawing
either not known or known not to conform nicely to the the line of practicality between algorithms requiring vak
criterion. Many of the beet algorithmic ideaa known steps and algorithms for which no such bound exists
today would suffer by such theoretical pedantry. In seems to be reasonable.
fact, an outstanding open question is, essentially: how
Cook, considering the complexity of theorem proving
good is a particular algorithm for linear programming,
[C071]. The class P is denoted by C:
the simplex method? And, on the other hand, many im-
portant algorithmic idess in electrical switching theory Furthermore, the theorems suggest that tautologies is
are obviously not good in our sense. a good candidate for an interesting set not in Z*, and I
However, if only to motivate the search for good, feel that it ia worth spending considerable effort trying
practical algorithms, it is important to realize that it to prove this conjecture. Such a proof would be a major
is mathematically sensible even to question their exis- breakthrough in complexity theory.
tence. For one thing the task can then be described in Levin, from Zhkhtenbrots survey on perebor [Le73,
terms of concrete conjectures. Z184]:
Fortunately, in the case of maximum matching the r~
This is the situation with so called exhaustive search
suits are positive. But possibly this favorable position
problems, including: the minimization of Boolean func-
is very seldom the case. Perhaps the twoness of edges
tions, the search for proofs of finite length, the deter-
makes the algebraic order for matching rather specisJ
mination of the isomorphism of graphs, etc. All of
for matching in comparison with the order of difficulty
these problems are solved by trivial algorithms entailing
for more general combinatorial extremum problems.
the sequentizd scanning of all possibilities. The operat-
Edmonds, discussing the matroid partition probiem ing time of the algorithm is, however, exponential, and
fEd65b]: mathematicians nurture the conviction that it is impos-
sible to find simpler algorithms.
We seek a good characterization of the minimum
number of independent sets into which the columns of Gi5del, in a letter to von Neumann. !fkamdated by
a matrix of II can be partitioned. As the criterion of Arthur S. Wensinger with Sorin Lstrai.1s guidance. The
good for the characterization we apply the princi- orignal letter is in the Manuscript Division of the Li-
ple of the absolute supervisor. The good characteriza- brary of Congress, Washington, D.C. The translator had
tion will describe certain information about the matrix access to Juris Hartmanis article @It?9]. Discussions
611
with liartley Rogers and Philip Scowcroft provided con- from a generalization of the proof for the unsolvabil-
tributions to the trsdation: ity of the Entscheidungsproblem; 2.) p(n) N Kn (or
N Kn2) means, of course, simply that the number of
Dear Mr. von Neumann, steps vis-h-via dem Mossen Pro biereng can be reduced
from IV to log IV (or (log lV)2)Such strong reductions10
To my great regret I have heard about your illness. do indeed occur, however, in the case of other finite
The news reached me most unexpectedly. Morgenstern problems, e.g., in the csse of calculating a quadratic
had, to be sure, told me in the summer about some infir- residuell by means of repeated application of the law
mity you had been suffering, but at the time he thought of reciprocity. It would be interesting to know, for ex-
that no major significance was to be attached to it. I ample, what the situation is in the case of determining
hear that you have been undergoing radical treatment whether a number is a prime number, and in the csse of
in the psst several months, and I am happy2 that this finite combinatorial problems, how strongly12 in genend
has achieved the desired results and that things are now the number of steps via->vis the blossen Probieren can
going better for you. I hope and wish that your condi- be reduced.
612
A
-4
.
,-3
.-L.
613
I
.
f-
-A
S. S.-*2?
J- s d_ f
.? f
$ =&
83
.~
---?.-
614
[BS90] R. B. BOPPANA AND M. SIPSER, The com-
plexity of finite functions, Handbook of The-
[Aj83] M. AJTAI, Z~-formulae on finite structures, oretical Computer Science, Elsevier, 758-804,
Annals of Pun and Applied Logic 24, 1-48, 1990.
1983.
[BU86] S. R. BUSS, Bounded Arithmetic, Bibliopolis,
[AB871 N. ALON AND R. B. BOPPANA, The mono- 1986.
tone circuit complexity of Boolean functions,
Combinatorics 7:1, 1-22, 1987. [C064] A. COBHAM, The intrinsic computationzd dif-
ficulty of functions, Proc. of the 1964 Interna-
[An85] A. E. ANDREEV, On a method for obtaining tional Congwss for Logic, Methodology, and
lower bounds for the complexity of individual the Philosophy of Science, edited by Y. Bar-
monotone functions, Doklady Akademii iVauk Hillel, North-Holland, 24-30, 1964.
SSSR 282:5, 1033-1037 (in Russian). English
translation in Soviet Mathematics Doklady [CSV84] A. K. CHANDRA) L. J. STOCKMEYER, AND
31:3,530-534, 1985. U. VISIIKIN, Constant depth reducibility,
SIAM Journal on Computing 13:2, 423-439,
[As55] G. ASSER, Das Reprii.sentatenproblem im 1984.
Pri+dikatenkalkul der ersten Stufe mit iden-
titat, Zeitschrift fiir Matenaitische Logic und [C071] S. A. COOK, The complexity of theorem
Grundlagen der Mathematik, 1, 252-263, proving procedures, Proceedings of the 3rd
1955. Annual ACM Symposium on Theory of Com-
puting, 151-158, 1971.
[BGS75] T. P. BAKER, J, GILL, AND R. SOLOVAY,
Relativizations of the P=?NP question, SIAM [C075] S. A. CooK, Fessably constructive proofs
Journal on Computing 4:4,431-442, 1975. and the propositional calculus, Proceedings of
the 7th Annual ACM Symposium on Theory
[Ba86a] D. A. BARRINGTON, Bounded-width poly- of Computing, 8397, 1975.
nomial-size branching programs recognize ex-
actly those languages in IfC1, Journal of [CU88] S. A. COOK AND A. URQUHART, Functional
Computer and System Sciences .98, 150-164, interpretations of fessibly constructive arith-
1986. metic, Technical Report 210/88, Computer
Science Department, University of Toronto,
[Ba86a] D. A. BARRINGTON, A note on a theorem of 1988.
Rszborov, manuscript, 1986.
[DL79J R. E. DEMILLO AND R. J. LIPTON, The
[BH91] S. BEN-DAVID AND S. HALEVI, On the Inde- consistency of P=NP and related problems
pendence of P versus NP, Tech. Report #699, within fragments of number theory, Proceed-
Technion, 1991. ings of the llth ACM Symposium on Theory
of Computing, 153159, 1979.
[Be82] S. J. BERKOWITZ, On some relationships
between monotone and non-monotone cir- [DU88] P. E. DUNNE, The Complexity of Boolean
cuit complexity, Technical Report, Computer Networks, Academic Press, 1988.
Science Department, University of Toronto,
1982. [Ed65] J. EDMONDS, Paths, trees, and flowers,
Canadian Journal of Mathematics, 17, 449-
[B167] M. BLUM, A machine-independent theory of 467, 1965.
the complexity of recursive functions, Journal
of the ACM, 14, no. 2, 322336, 1967. [Ed65b] J. EDMONDS, Minimum partition of a ma-
troid into independent sets, Journal of Re-
[B184] N. BLUM, A Boolean function requiring 3n search of the National Bureau of Standards
network size, Theoretical Computer Science (B), 69,67-72,1965,
28, 337-345, 1984.
[EIRS91] J. EDMONDS, R. IMPAGLIAZZO, S. RUDICH,
[B086] R. B. BOPPANA, Threshold functions and J. SGALL, Communication complexity to-
bounded depth monotone circuits, Journal of wards lower bounds on circuit depth, Proceed-
Computer and System Sciences 32:2,222-229, ings of the 3$%d Annual Symposium on Foun-
1986. dations of Computer Science, 249-257, 1991.
615
[Fa74] R. FAGIN, Generalized first-order spectra and [H586] J. H~STAD, Computational Limitations for
polynomial-time recognizable sets, Complex- Small Depth Circu-its, MIT Press, 1986. -
ity of Computation, SIAM-AMS Proceedings
[HW91] J. HISTAD, A. WIGDEItSON, Composition of
7,43-73, 1974.
the Universal Relation, manuscript, 1991.
[FS88] L. FORTNOW AND M. SIPSER, Are there
[HU79] J. E. HOPCROFT AND J. D. ULLMAN, Intro-
interactive protocols for CGNP languages?
duction to Automata Theory, Languages, and
Information Processing Letters 28, 249-251,
Computation, Addison-Wesley, 1979.
1988.
~m87] N. IMMERMAN, Languages that capture com-
[FSS84] M. FURST, J. SAXE, AND M. SIPSER, Par-
plexity classes, SIAM Journal on Computing
ity, circuits and the polynomial time hierar-
16:4,760-778, 1987.
chy, Mathematical Systems Theoy 17, 1327,
1984. [Im88] N, IMMERMAN, Nondeterministic space is
closed under complement, SIAM Journal on
[Ga771 Z. GALIL, On the complexity of regular reso-
Computing, 935-938, 1988.
lution and the Davis-Putnam procedure, The-
oretical Computer Science 4, 23-46, 1977. [JS74] N. D. JONES AND A. L. SELMAN, Turing ma-
chines and the spectra of first-order formulas,
[GJ79] M. GAREY AND D. S. JOHNSON, Computers Journal of Symbolic Logic 39, 139-150, 1974.
and Intractability: a guide to the theoy of
NP-covnpleteness, Freeman, 1979. [KS87] B. KALYANASUNDARAM AND G. SCHNIT-
GER, The probabilistic communication com-
[GH89] M. Goldmann, J. Hiktad, A lower bound plexity of set intersection, Proceedings of the
for monotone clique using a communication Second Annual Conference on Structure in
game, manuscript, 1989. Complexity Theoy, 4149, 1987.
[Ha$5] A. HAKEN, The intractability of resolution, [Leo5] H. LEBESGUE, Sur les fonctions repr&en-
Theoretical Computer Science 39, 297-308, tables analytiquement, Journal de Math. 6
1985. serie 1, 139-216, 1905.
616
[Le73] L. LEVIN, Universal sequential search prob- [Ra85b] A, A. RAZBOROV, A lower bound on the
lems, Probl. Pemd. Inform. IX $?,1973; trans- monotone network complexity of the logical
lationin Problems of Information Trans 9,3, permanent, Matematicheskie Zametki 37:6,
265-266; corrected translation in llakhten- 887-900 (in Russian). English translation in
brot [TY84]. Mathematical Notes of the Academy of Sci-
ences of the USSR 37:6, 485-493, 1985.
[Li78] R. J. LIPTON, Model theoretic aspects of
complexity theory, Proceeding of the19th An- [Ra87j A. A. RAZBOROV, Lower bounds on the
nual Symposium on Foundations of Computer size of bounded depth networks over a com-
Science, 193-200, 1978. plete basis with logical addition, Matematich-
eskie Zametki 41:4, 598607 (in Russian). En-
[LFKN901 C. LUND, L. FORTNOW, H. KARLOFF, AND glish translation in Mathematical Notes of the
N. NISAN, Algebraic methods for interactive Academy of Sciences of the USSR 41:4,333-
proof systems, Proceedings of 22th Annual 338, 1987.
ACM Symposium on Theoy of Computing,
[Ra89] A. A. RAZBOROV, On the method of ap-
210, 1990; to appear in the Journal of the
proximations, Proceedings of the 21st Annual
ACM.
ACM Symposium on Theory of Computing,
~S72] A. R. MEYER, AND L. J. STOCKMEYER, 168-176, 1989.
The equivalence problem for regular expres-
[Ra90a] A. A. RAZBOROV, On the distributional com-
sions with squaring requires exponential time,
plexity of disjointness, Proceeding of the In-
Proceedings of the 13th Annual Symposium
ternational Conference on Automata, Lan-
on Switching and Automata Theoy, 125-129,
guages, and Computation, 1990; to appear in
1972.
Theoretical Compuier Science.
617
[Si84] M. SIPSER, A topological view of some prob-
lems in complexity theory, Colloquia Mathe-
matical Societatis J4nos Bolyai 44, 387391,
1984.
618