ON THE COMPLEXITY OF FUNCTIONS FOR RANDOM-ACCESS MACHINES

被引:4
作者
BSHOUTY, NH
机构
[1] UiliLersity of Calgay, Calgary, Alberta
关键词
ALGORITHMS; THEORY; VERIFICATION; GREATEST COMMON DIVISOR; INDIRECT ADDRESSING; RANDOM ACCESS MACHINE; SORTING;
D O I
10.1145/151261.151262
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Tight bounds are proved for Sort, Merge, Insert, Gcd of integers, Gcd of polynomials, and Rational functions over a finite inputs domain, in a random access machine with arithmetic operations, direct and indirect addressing, unlimited power for answering YES/NO questions, branching, and tables with bounded size. These bounds are also true even if additions, subtractions, multiplications, and divisions of elements by elements of the field are not counted. In a random access machine with finitely many constants and a bounded number of types of instructions, it is proved that the complexity of a function over a countable infinite domain is equal to the complexity of the function in a sufficiently large finite subdomain.
引用
收藏
页码:211 / 223
页数:13
相关论文
共 50 条
[21]   Approximating the Influence of Monotone Boolean Functions in O(root n) Query Complexity [J].
Ron, Dana ;
Rubinfeld, Ronitt ;
Safra, Muli ;
Samorodnitsky, Alex ;
Weinstein, Omri .
ACM TRANSACTIONS ON COMPUTATION THEORY, 2012, 4 (04)
[22]   Controlled physical random functions and applications [J].
Gassend, Blaise ;
Van Dijk, Marten ;
Clarke, Dwaine ;
Torlak, Emina ;
Devadas, Srinivas ;
Tuyls, Pim .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
[23]   Cryptographic Hardness of Random Local Functions [J].
Applebaum, Benny .
COMPUTATIONAL COMPLEXITY, 2016, 25 (03) :667-722
[24]   Complexity Analysis of Random Geometric Structures Made Simpler [J].
Devillers, Olivier ;
Glisse, Marc ;
Goaoc, Xavier .
PROCEEDINGS OF THE TWENTY-NINETH ANNUAL SYMPOSIUM ON COMPUTATIONAL GEOMETRY (SOCG'13), 2013, :167-175
[25]   Spatial random multiple access with multiple departure [J].
Foss, Sergey ;
Turlikov, Andrey ;
Grankin, Maxim .
2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, :2728-2731
[26]   Sign-Compute-Resolve for Random Access [J].
Goseling, Jasper ;
Stefanovic, Cedomir ;
Popovski, Petar .
2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, :675-682
[27]   Program Algebra for Random Access Machine Programs [J].
Middelburg, C. A. .
SCIENTIFIC ANNALS OF COMPUTER SCIENCE, 2022, 32 (02) :285-319
[28]   Random Access to Grammar-Compressed Strings [J].
Bille, Philip ;
Landau, Gad M. ;
Raman, Rajeev ;
Sadakane, Kunihiko ;
Satti, Srinivasa Rao ;
Weimann, Oren .
PROCEEDINGS OF THE TWENTY-SECOND ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2011, :373-389
[29]   Stream cipher encryption of random access files [J].
Golic, JD .
INFORMATION PROCESSING LETTERS, 1999, 69 (03) :145-148
[30]   The Unrestricted Black-Box Complexity of Jump Functions [J].
Buzdalov, Maxim ;
Doerr, Benjamin ;
Kever, Mikhail .
EVOLUTIONARY COMPUTATION, 2016, 24 (04) :719-744