skip to main content
10.1145/2488608.2488710acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Lower bounds for RAMs and quantifier elimination

Published:01 June 2013Publication History

ABSTRACT

For each natural number d we consider a finite structure Md whose universe is the set of all 0,1-sequence of length n=2d, each representing a natural number in the set {0,1,...,2n-1} in binary form. The operations included in the structure are the four constants 0,1,2n-1,n, multiplication and addition modulo 2n, the unary function min{2x, 2n-1}, the binary functions ⌊ x/y⌋ (with ⌊ x/0 ⌋ =0), max(x,y), min(x,y), and the boolean vector operations, vee,- defined on 0,1 sequences of length n, by performing the operations on all components simultaneously. These are essentially the arithmetic operations that can be performed on a RAM, with wordlength n, by a single instruction. We show that there exists an ε>0 and a term (that is, an algebraic expression) F(x,y) built up from the mentioned operations, with the only free variables x,y, such that if Gd(y), d=0,1,2,..., is a sequence of terms, and for all d=0,1,2,..., Md models ∀ x, [Gd(x)-> ∃ y, F(x,y)=0], then for infinitely many integers d, the depth of the term Gd, that is, the maximal number of nestings of the operations in it, is at least ε (log d)1/2 = ε (log log n)1/2.

The following is a consequence. We are considering RAMs Nn, with wordlength n=2d, whose arithmetic instructions are the arithmetic operations listed above, and also have the usual other RAM instructions. The size of the memory is restricted only by the address space, that is, it is 2n words. The RAMs has a finite instruction set, each instruction is encoded by a fixed natural number independently of n. Therefore a program P can run on each machine Nn, if n=2d is sufficiently large. We show that there exists an ε>0 and a program P, such that it satisfies the following two conditions. (i) For all sufficiently large n=2d, if P running on Nn gets an input consisting of two words a and b, then, in constant time, it gives a 0,1 output Pn(a,b). (ii) Suppose that Q is a program such that for each sufficiently large n=2d, if Q, running on Nn, gets a word a of length n as an input, then it decides whether there exists a word b of length n such that Pn(a,b)=0. Then, for infinitely many positive integers d, there exists a word a of length n=2d, such that the running time of Q on Nn at input a is at least ε (log d)1/2 (log log d)-1 ≥ (log d)1/2-ε= (log log n)1/2-ε.

References

  1. .V. Aho, J.E. Hopcroft, J.D. Ullman, The Design andAnalysis of Computer Algorithms, Addison-Wesley, 1974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. . Ajtai. Detreminism versus Nondeterminism with Arithmetic Tests and Computation,Proceedings of the 44th ACM Symposium on Theory of Computing, STOC 2012,New York, NY, USA, June 2012, pages 249--268 ACM,2012., see also Electronic Colloquium on Computational Complexity (ECCC), 2012 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. . Ajtai, Determinism versus Nondeterminism forLinear Time RAMs with Memory Restrictions, Journal of Computer andSystems Science, 65(1): 2--37, (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Ajtai, Oblivious $RAM$s without cryptographic assumptions, Electronic Colloquium on Computational Complexity (ECCC),17:28, 2010.Google ScholarGoogle Scholar
  5. . Ajtai. Oblivious $RAM$s without cryptographic assumptions,Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010,Cambridge, Massachusetts, USA, 5--8 June 2010, pages 181--190. ACM,2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Artin. Galois Theory, Dover Publications, 1998.(Reprinting of second revised edition of 1944, The University of NotreDame Press).Google ScholarGoogle Scholar
  7. P. Beame, S. A. Cook, and H. J. Hoover, Log Depth Circuits for Division and Related Problems, SIAM Journal on Computing, 15(4):994--1003, November 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. . Beame, T. S. Jayram, M. Sacks, Time-space tradeoffs for branching programs, Journal of Computer and Systems Science,63(4):542--572, December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. . Beame, M. Sacks, Xiadong Sun, E. Vee, Time-space trade-off lower bounds for randomized computation of decision problems,Journal of ACM, 50(2):154--195,2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Davis, H. Putnam and J. Robinson, The decision problem for exponential diophantine equations, Ann. of Math. (2) 74 (1961),425--436. 3. J. P. Jones, Three universal representations of r.e. sets,J. Symbolic Logic 43 (1978), 335--351.Google ScholarGoogle ScholarCross RefCross Ref
  11. W. Hesse, Division is in Uniform $TC^0$, ICALP 2001: 104--114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. . Hopcroft, W. Paul, L. Valiant, On Time Versus Space,Journal of ACM, 24(2):332--337,April 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Fortnow, Time-space trade offs for satisfiability, Journal of Computer and System Sciences, 60:337--353, 2000. Google ScholarGoogle ScholarCross RefCross Ref
  14. Ju. V. Matijasevic, Enumerable sets are diophantine, Dokl. Akad.Nauk SSSR 191 (1970), 279--282. English transi.: Soviet Math. Doklady11 (1970), 354--358.Google ScholarGoogle Scholar
  15. . Paul, N. Pippenger, E. Szemerédi, and W. Trotter. On determinism versus non determinism and related problems,In Proceedings of the 24th IEEE Symposium on Foundations of Computer Science, pages 429--438. IEEE, New York, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. . Takeuti, Proof Theory,North-Holland, Studies in Logic and the Foundations of Mathematics, Vol. 81, Second edition, 1987.Google ScholarGoogle Scholar

Index Terms

  1. Lower bounds for RAMs and quantifier elimination

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '13: Proceedings of the forty-fifth annual ACM symposium on Theory of Computing
      June 2013
      998 pages
      ISBN:9781450320290
      DOI:10.1145/2488608

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 June 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      STOC '13 Paper Acceptance Rate100of360submissions,28%Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader