Search results for "Turing machine"

showing 10 items of 40 documents

Algebraic and logical characterizations of deterministic linear time classes

1997

In this paper an algebraic characterization of the class DLIN of functions that can be computed in linear time by a deterministic RAM using only numbers of linear size is given. This class was introduced by Grandjean, who showed that it is robust and contains most computational problems that are usually considered to be solvable in deterministic linear time.

AlgebraClass (set theory)Turing machinesymbols.namesakeGlobal functionsymbolsComputational problemBinary stringsAlgebraic numberCharacterization (mathematics)Time complexityMathematics
researchProduct

Hartmanis-Stearns Conjecture on Real Time and Transcendence

2012

Hartmanis-Stearns conjecture asserts that any number whose decimal expansion can be computed by a multitape Turing machine is either rational or transcendental. After half a century of active research by computer scientists and mathematicians the problem is still open but much more interesting than in 1965.

AlgebraTuring machinesymbols.namesakeRational numberConjectureIrrational numbersymbolsMultitape Turing machineDecimal representationTranscendental numberAlgebraic numberMathematics
researchProduct

Positive Versions of Polynomial Time

1998

Abstract We show that restricting a number of characterizations of the complexity class P to be positive (in natural ways) results in the same class of (monotone) problems, which we denote by posP . By a well-known result of Razborov, posP is a proper subclass of the class of monotone problems in P . We exhibit complete problems for posP via weak logical reductions, as we do for other logically defined classes of problems. Our work is a continuation of research undertaken by Grigni and Sipser, and subsequently Stewart; indeed, we introduce the notion of a positive deterministic Turing machine and consequently solve a problem posed by Grigni and Sipser.

Class (set theory)Computational complexity theoryAlgorithmic logicTheoretical Computer ScienceComputer Science ApplicationsCombinatoricsTuring machinesymbols.namesakeMonotone polygonNon-deterministic Turing machineComputational Theory and MathematicsComplexity classsymbolsTime complexityMathematicsInformation Systems
researchProduct

Models of Computation, Riemann Hypothesis, and Classical Mathematics

1998

Classical mathematics is a source of ideas used by Computer Science since the very first days. Surprisingly, there is still much to be found. Computer scientists, especially, those in Theoretical Computer Science find inspiring ideas both in old notions and results, and in the 20th century mathematics. The latest decades have brought us evidence that computer people will soon study quantum physics and modern biology just to understand what computers are doing.

Classical mathematicsFinite-state machineComputer sciencebusiness.industryModel of computationEpistemologyPhilosophy of computer sciencePhilosophy of languageTuring machinesymbols.namesakeRiemann hypothesisFormal languagesymbolsArtificial intelligencebusiness
researchProduct

Gödel and the Blind Watchmaker

2015

While accepting that contingency is key to biological evolution, we wonder how much need there is for it. It is extremely difficult to talk about trends in evolution, but the fact remains that they are found here and there when evolutionary experiments are repeated. But we should ask, for example, whether there is an unavoidable tendency of life towards progressive complexity . This chapter deals with certain theoretical considerations from Logic and Computing on the conditions necessary to formulate a predictive evolutionary theory .

Cognitive scienceComputer scienceBiological evolutionWonderTuring machinesymbols.namesakeSynthetic biologysymbolsKey (cryptography)GödelContingencycomputerEvolutionary theorycomputer.programming_language
researchProduct

On the Computational Complexity of Binary and Analog Symmetric Hopfield Nets

2000

We investigate the computational properties of finite binary- and analog-state discrete-time symmetric Hopfield nets. For binary networks, we obtain a simulation of convergent asymmetric networks by symmetric networks with only a linear increase in network size and computation time. Then we analyze the convergence time of Hopfield nets in terms of the length of their bit representations. Here we construct an analog symmetric network whose convergence time exceeds the convergence time of any binary Hopfield net with the same representation length. Further, we prove that the MIN ENERGY problem for analog Hopfield nets is NP-hard and provide a polynomial time approximation algorithm for this p…

Computational complexity theoryCognitive NeuroscienceComputationBinary numberHopfield networkTuring machinesymbols.namesakeRecurrent neural networkArts and Humanities (miscellaneous)Convergence (routing)symbolsTime complexityAlgorithmMathematicsNeural Computation
researchProduct

Descriptive Complexity, Lower Bounds and Linear Time

1999

This paper surveys two related lines of research: Logical characterizations of (non-deterministic) linear time complexity classes, and non-expressibility results concerning sublogics of existential second-order logic. Starting from Fagin’s fundamental work there has been steady progress in both fields with the effect that the weakest logics that are used in characterizations of linear time complexity classes are closely related to the strongest logics for which inexpressibility proofs for concrete problems have been obtained. The paper sketches these developments and highlights their connections as well as the obstacles that prevent us from closing the remaining gap between both kinds of lo…

Computational complexity theoryComputer scienceDescriptive complexity theoryMathematical proofCombinatoricsTuring machinesymbols.namesakeTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESRegular languageCalculusComplexity classsymbolsUnary functionTime complexity
researchProduct

Computational Complexity and Communication: Coordination in Two-Player Games

2002

The main contribution of this paper is the development and application of cryptographic techniques to the design of strategic communication mechanisms. One of the main assumptions in cryptography is the limitation of the computational power available to agents. We introduce the concept of limited computational complexity, and by borrowing results from cryptography, we construct a communication protocol to establish that every correlated equilibrium of a two-person game with rational payoffs can be achieved by means of computationally restricted unmediated communication. This result provides an example in game theory where limitations of computational abilities of players are helpful in solv…

Computer Science::Computer Science and Game TheoryEconomics and EconometricsCorrelated equilibriumTheoretical computer scienceComputational complexity theorybusiness.industryCryptographyComputational resourceTuring machinesymbols.namesakeNash equilibriumsymbolsbusinessCommunications protocolGame theoryAlgorithmMathematicsEconometrica
researchProduct

Transformations that preserve learnability

1996

We consider transformations (performed by general recursive operators) mapping recursive functions into recursive functions. These transformations can be considered as mapping sets of recursive functions into sets of recursive functions. A transformation is said to be preserving the identification type I, if the transformation always maps I-identifiable sets into I-identifiable sets.

Computer scienceLearnabilityType (model theory)Inductive reasoningAlgebraTuring machinesymbols.namesakeIdentification (information)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESTransformation (function)TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMSRecursive functionssymbolsInitial segment
researchProduct

One-Counter Verifiers for Decidable Languages

2013

Condon and Lipton (FOCS 1989) showed that the class of languages having a space-bounded interactive proof system (IPS) is a proper subset of decidable languages, where the verifier is a probabilistic Turing machine. In this paper, we show that if we use architecturally restricted verifiers instead of restricting the working memory, i.e. replacing the working tape(s) with a single counter, we can define some IPS’s for each decidable language. Such verifiers are called two-way probabilistic one-counter automata (2pca’s). Then, we show that by adding a fixed-size quantum memory to a 2pca, called a two-way one-counter automaton with quantum and classical states (2qcca), the protocol can be spac…

Counter machineTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESTheoretical computer scienceQuantum registerComputer scienceProbabilistic Turing machineProbabilistic logicInteractive proof systemComputer Science::Computational ComplexityDecidabilityAutomatonsymbols.namesakesymbolsProtocol (object-oriented programming)
researchProduct