Révision 184

CharacterizingPH/LCC17/lcc2017.tex (revision 184)
1
\documentclass[a4paper]{article}
2

  
3
\usepackage{amssymb}
4
\usepackage{amsthm}
5
\usepackage{hyperref}
6
\setcounter{tocdepth}{3}
7

  
8
\newtheorem*{conjecture*}{Conjecture}
9
\newcommand{\fph}{\mathbf{PH}}
10

  
11

  
12
\title{An implicit characterisation of the polynomial hierarchy in an unbounded arithmetic }
13
\author{Patrick Baillot \and Anupam Das}
14
%\date{ Univ Lyon, CNRS, ENS de Lyon, Universit\'e Claude Bernard Lyon 1, LIP
15
%	%\\[2ex] \today
16
%	}
17
\date{ Univ Lyon, CNRS, ENS de Lyon, UCB Lyon 1, LIP
18
	%\\[2ex] \today
19
	}	
20
	\newcommand{\ph}{\mathbf{PH}}
21
	\newcommand{\pspace}{\mathbf{PSPACE}}
22
	\newcommand{\fpspace}{\mathbf{FPSPACE}}
23
	\newcommand{\ptime}{\mathbf{P}}
24
	\newcommand{\fptime}{\mathbf{FP}}
25
	\newcommand{\nc}{\mathbf{NC}}
26
	\newcommand{\ac}{\mathbf{AC}}
27
	\newcommand{\exptime}{\mathbf{EXP}}
28

  
29

  
30
\begin{document}
31
\maketitle
32

  
33
%\begin{itemize}
34
%\item a big picture: logic methods for complexity classes:
35
%
36
%\begin{tabular}{c|c}
37
%ground & higher-order\\
38
%quantifiers  & type-level\\
39
%PSPACE    & $k$-EXP\\
40
%PH  &              P\\
41
%P  &\\
42
%$NC_i$&
43
%\end{tabular}
44
%
45
%\item  state of the art on arithmetics for complexity classes:
46
%
47
%\begin{tabular}{c|c|c|c}
48
%{\small model of comp. $\backslash$ extracted program } & Cobham & mon. constraints & BC-like \\
49
%\hline &&\\
50
%formula & PH, $\square_i$&&\\
51
%               & bounded induction (Buss) &&\\
52
%               \hline &&\\
53
%equational &&& P\\
54
%&&& (intrinsic theories: Leivant) \\
55
%\hline &&\\
56
%applicative &&PH & P \\
57
% &&(Kahle-Oitavem)& (Cantini)
58
%\end{tabular}
59
%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
60
%\item an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
61
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
62
%\item the setting we will consider: 
63
%\begin{itemize}
64
%\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
65
%\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
66
%\end{itemize}
67
%\item Our conjecture: ramified first-order modal classical logic with full induction, for equational programs, characterize the class PH.
68
%
69
%the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
70
%\end{itemize}
71
%
72
%\newpage
73

  
74
\section{Introduction and motivation}
75
Today, there are countless approaches towards characterising complexity classes via logic.
76
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
77
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
78

  
79
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
80
A somewhat orthogonal distinction is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}.
81

  
82
Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}.
83

  
84
In this line of work we attempt to ameliorate the situation by using implicit methods to delineate fine-grained hierarchies of feasible complexity classes, namely the \emph{polynomial hierarchy}, $\ph$.
85
One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}.
86
In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories.
87
This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}.
88

  
89
\section{State of the art}
90
As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory.
91
As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.}
92
%, distinguished by the type level of programs extracted:
93

  
94
\bigskip
95

  
96
\begin{tabular}{c|c|c}
97
Class &	Ground & Higher order\\
98
	\hline
99
%	quantifiers  & type-level\\
100
	$\nc^i$    & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\
101
	$\ptime$  &  $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\
102
	$\Box_i$  & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & -  \\
103
	$\ph$& $S_2$ & - \\
104
	$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\
105
%	$k$-$\exptime$ & -  & $\mathit{ELL}(k)$ \\
106
	Elementary & $I\Delta_0 + \exp$  & $\mathit{ELL}\;  \cite{Girard94:lll}$
107
\end{tabular}
108

  
109
\bigskip
110

  
111
\noindent
112
Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'. 
113
%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture.
114
%
115
% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several 
116
  Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular:
117
 \begin{itemize}
118
   \item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra;
119
   \item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra.
120
 \end{itemize}
121
We classify some known characterisations from the literature according to these two parameters in  the following table:
122
\bigskip
123
 
124
\begin{tabular}{c|c|c}
125
	{
126
		%\small model of comp. $\backslash$ extracted program 
127
		} & bounded rec. programs & tiered rec. programs \\
128
	\hline &&\\
129
	formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
130
%	& bounded induction (Buss \cite{Buss86book}) &\\
131
	\hline &&\\
132
	equational && $\ptime$\\
133
	&& (Leivant \cite{Leivant94:intrinsic-theories}) \\
134
	\hline &&\\
135
	applicative & $\ptime$ (Strahm \cite{Strahm03})  & $\ptime$ \\
136
	&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
137
\end{tabular}
138

  
139
%TODO: improve table to make clear columns and rows, explicit and implicit columns.
140
%
141
%\begin{tabular}{c|c|c|c}
142
%	{
143
%		%\small model of comp. $\backslash$ extracted program 
144
%		} & Cobham & mon. constraints & BC-like \\
145
%	\hline &&\\
146
%	formula & PH, $\square_i$&&\\
147
%	& bounded induction (Buss) &&\\
148
%	\hline &&\\
149
%	equational &&& P\\
150
%	&&& (Leivant) \\
151
%	\hline &&\\
152
%	applicative &&PH & P \\
153
%	&&(Kahle-Oitavem)& (Cantini)
154
%\end{tabular}
155

  
156
\bigskip
157

  
158
\noindent
159
%%% DICEFOPARA revision hereafter
160
Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the formula style of specification (first row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
161
%
162
%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
163
%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy.
164

  
165
\section{An implicit theory for $\ph$}
166
%As we mentioned, the goal of this work-in-progress is to arrive at an implicit characterisation of PH. 
167
We explain our approach for this work-in-progress in more detail here, referring to previous work when analogous methods are used.
168

  
169
\subsection{Implicit programs for $\ph$}
170
Since we want to remain at ground type, the natural programs in which to extract our witnesses will come from recursion theoretic characterisations, cf.\ the table above. Indeed, as we have already mentioned, we are not aware of any `higher-type' characterisation of $\ph$. 
171
Of these, only the Bellantoni framework from \cite{BellantoniThesis}, which extends BC-programs by \emph{predicative minimisation} constitutes an implicit characterisation, and so we will look to extract our programs into this function algebra, henceforth denoted $\mu$BC.
172

  
173
\subsection{Constraints on induction}
174
An appealing feature of the bounded arithmetic approach is that bounds on (bounded) quantifier alternation in induction formulae precisely delimit the levels of $\ph$, and one of our desiderata is to replicate this property, only for unbounded quantifiers.
175
Naturally, another constraint will be required to stop ourselves from exhausting the arithmetical hierarchy once bounds are dismissed, and for this we use essentially a \emph{ramification} of individuals: explicit predicates $N_0, N_1 , \dots$ will be used similarly to Peano's $N$ predicate to intuitively indicate `how sure' we are that a variable denotes a genuine natural number.
176

  
177
In fact, two predicates will suffice and their relationship is entirely governed by the equation $N_1 (x) \iff \square N_0 (x)$, under the laws of the modal logic $\mathit{S4}$. 
178
The distinction between the two predicates corresponds to the distinction between safe and normal variables in BC-like programs, which was an observation from previous work \cite{BaillotDas16}.
179
A similar phenomenon occurs in Cantini's work \cite{Cantini02}, which presents a characterisation of $\ptime$ in an \emph{applicative theory}, in order to extract BC programs. 
180
While he allows arbitrary alternation of unbounded quantifiers, note that his induction is \emph{positive}, and so universal quantifiers cannot vary over certified natural numbers, i.e.\ individuals in $N$. In fact this sort of unbounded quantification is also compatible with our approach of \cite{BaillotDas16}.
181
%with an approach in previous work where we characterised $\ptime$ in a \emph{linear logic}, also extracting BC programs %\cite{BaillotDas16}.
182

  
183

  
184

  
185
\subsection{Extraction at ground type}
186
As we did in \cite{BaillotDas16}, we will rely on the \emph{witness function method} for extracting functions at bounded type.
187
%This was pioneered by Buss, although independently used by Mints beforehand. 
188
The idea is as follows:
189
\begin{enumerate}
190
	\item\label{item:de-morgan} Reduce a proof to \emph{De Morgan} normal form, with formulae over the basis $\{ \bot, \top, \vee , \wedge , \exists, \wedge \}$ and negation restricted to atoms.
191
	\item\label{item:free-cut} Conduct a \emph{free-cut elimination} on the proof, resulting in a proof whose formulae are restricted to
192
	essentially just subformulae of the conclusion, axioms and nonlogical steps.
193
	\item\label{item:interp} Extract witnesses inductively from the proof, with appropriate semantic properties of these programs verified by an interpretation into a (classical) quantifier-free theory.
194
\end{enumerate}
195

  
196
\ref{item:de-morgan} ensures that our extraction works at ground type, rather than higher types which are typically necessary when negation has larger scope.
197
At the same time it preserves the quantifier alternation information that is crucial to distinguishing the levels of $\ph$.
198
\ref{item:free-cut} allows us to assume that all formulae in a proof have logical complexity bounded by that of induction formulae.
199
This means that, when extracting programs via \ref{item:interp}, quantifier alternation of induction formulae corresponds to the depth of minimisation operators in a $\mu$BC program, and so potentially allows for a level-by-level correspondence with the polynomial hierarchy.
200

  
201

  
202
We point out that, in some ways, this is similar to approaches from applicative theories, which typically use free-cut elimination followed by a direct \emph{realisability} argument, e.g.\ in \cite{Strahm03}, \cite{Cantini02} and \cite{KahOit:13:ph-levels}.
203
Indeed this could have been possible in our previous work \cite{BaillotDas16}, as Cantini did in his work \cite{Cantini02}, for a characterisation of $\ptime$.
204
However, in this case, since the quantifiers are unbounded the realisability argument is apparently not readily formalised, and it is therefore quite natural to pursue a \emph{bona fide} proof interpretation.
205

  
206
%%% Following part has been removed in the revised DICEFOPARA version
207
%For this, it seems we need to go one level higher than type 1 functions to verify semantic properties of witnesses of first-order formulae, themselves considered as genuine type 1 functions. Intuitively this is simply an inlining of \emph{Skolemisation}, although the idea of extending `witness predicates' to type 1 objects resembles methods from second-order bounded arithmetic, e.g.\ \cite{Cook:2010:LFP:1734064}. 
208
%Unlike in the bounded arithmetic setting, due to the apparent unboundedness of programs in the $\mu$BC framework, we will need a formal witness predicate implemented itself as a BC-like program, hence the need for a proof interpretation rather than a realisability approach.
209
%% since we cannot externally certify the complexity of the predicate when unbounded quantifiers abound.
210
%Fortunately, we believe that it suffices to consider $\mu$BC-programs with \emph{holes}, rather than a full characterisation of type 2 $\ph$, but verifying that such an approach could work represents the outstanding technical component of this work-in-progress.
211
	
212
	
213
	\subsection{Completeness for PH}
214
	In the other direction, showing completeness for $\ph$, it seems straightforward to formalise a standard argument, e.g.\ from bounded arithmetic \cite{Buss86book}, where applications of minimisation in a program correspond to the \emph{well ordering property} in arithmetic.
215
	This is in turn is a corollary of induction but, in this case, crucially relies on the use of \emph{right-contraction} in the logic.
216
	It seems that this feature is crucial in distinguishing these theories from `linear' variants like in previous work \cite{BaillotDas16}, and in particular work of Bellantoni and Hofmann \cite{BelHof:02} where, without right-contraction, any number of quantifier alternations still corresponds to only polynomial time computation.
217
	
218
%	* PB: I would suggest to skip **
219
%	
220
%	TODO or skip? If so just say that we formalise the standard argument (with explanation, e.g.\ minimisation, WOP, induction) but rely on safety of quantification rather than boundedness, which should come for free by inspection.
221
%	
222
	\subsection{Putting it all together}
223
	
224
To summarise the main goal of this work-in-progress, we are aiming for a variation of the following result:
225
	
226
	
227
\begin{conjecture*}
228
	First-order classical modal logic $\mathit{S4}$ with induction restricted to non-modal formulae, over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
229
\end{conjecture*}
230
% ALTERNATIVE SUGGESTION
231
%\begin{conjecture*}
232
%	First-order ramified classical  logic with induction restricted to \textit{safe} formulae (that is to say not containing any $N_1$), over a suitable set of axioms, characterises the class $\ph$. Bounds on quantifier alternation in induction formulae delimit the levels of $\ph$.
233
%\end{conjecture*}
234
	
235
	
236
%	As mentioned, we will 
237
%	
238
%	[copied]
239
%	
240
%	%\item our goal: explore the properties of implicit complexity arithmetics, and in particular import in the area of implicit complexity some techniques based on the control of first-order quantification, so as to characterize complexity classes between P and PSPACE (in particular PH).
241
%	
242
%	the setting we will consider: 
243
%	\begin{itemize}
244
%		\item classical first order modal logic ($S4$); a predicate $W(.)$ stands for (binary representations of) integers; the modality $\square$ is a tool for managing ramification (as in  [Cantini00, BellantoniHofmann02]), in particular to distinguish safe integers (by $W(.)$) from normal ones ($\square W(.)$), according to Bellantoni-Cook's terminology.
245
%		\item \textit{specifications} (or program descriptions) are given by theories over basic formulas consisting in equations (this will be a slight generalization of the setting of intrinsic theories described by Leivant, and used by    [BellantoniHofmann02]).
246
%	\end{itemize}
247
%	
248
	
249
%	the function algebra characterization of PH we want to use for that is Bellantoni's $\mu$-functions algebra for PH (cf. Bellantoni's PhD thesis).
250
%
251
%
252
%
253
%\subsection{Extending previous work}
254
%
255
%
256
%\subsection{Witness function method}
257
%%keep this subsection?
258
%
259
%
260
%\subsection{Relation to previous work}
261
%
262
%an apparent paradox: when one considers induction over arbitrarily quantified formulas the ramified arithmetics
263
%of [Cantini00] and [BellantoniHofmann02] characterize P, while Buss' bounded arithmetic $S_2$ characterizes PH (while restriction to induction over $\Sigma_1$ formulas corresponds to P).
264

  
265
\section{Conclusions}
266
We surveyed the state of the art for representing function classes proof theoretically by logics and theories, and considered the problem of finding an implicit characterisation of $\ph$.
267
Identifying the witness function method as a useful tool for witness extraction at bounded type level, a seemingly important prerequisite for characterising $\ph$, we sought to calibrate an appropriate theory of arithmetic for witness extraction to the $\mu$BC characterisation of $\ph$.
268
%We presented a conjecture that a ramified theory suffices to carry out this characterisation, based on previous work by ourselves and others 
269
We presented a conjecture that a modal theory suffices to carry out this characterisation, based on previous work by ourselves and others\cite{BaillotDas16} \cite{Cantini02} \cite{BelHof:02} and proving this result constitutes the outstanding work-in-progress.
270

  
271
\bibliographystyle{plain}
272
\bibliography{biblio}
273

  
274
\end{document}
CharacterizingPH/LCC17/biblio.bib (revision 184)
1

  
2
@article{GaboardiMarionRonchi12,
3
  author    = {Marco Gaboardi and
4
               Jean{-}Yves Marion and
5
               Simona Ronchi Della Rocca},
6
  title     = {An Implicit Characterization of {PSPACE}},
7
  journal   = {{ACM} Trans. Comput. Log.},
8
  volume    = {13},
9
  number    = {2},
10
  pages     = {18:1--18:36},
11
  year      = {2012},
12
  url       = {http://doi.acm.org/10.1145/2159531.2159540},
13
  doi       = {10.1145/2159531.2159540},
14
  timestamp = {Mon, 09 Jan 2017 14:08:26 +0100},
15
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tocl/GaboardiMR12},
16
  bibsource = {dblp computer science bibliography, http://dblp.org}
17
}
18

  
19
@article{Baelde12,
20
  author    = {David Baelde},
21
  title     = {Least and Greatest Fixed Points in Linear Logic},
22
  journal   = {{ACM} Trans. Comput. Log.},
23
  volume    = {13},
24
  number    = {1},
25
  pages     = {2},
26
  year      = {2012}
27
  }
28

  
29
@inproceedings{BaillotDas16,
30
  author    = {Patrick Baillot and
31
               Anupam Das},
32
  title     = {Free-Cut Elimination in Linear Logic and an Application to a Feasible
33
               Arithmetic},
34
  booktitle = {Proceedings of CSL 2016},
35
  pages     = {40:1--40:18},
36
    series    = {LIPIcs},
37
  volume    = {62},
38
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
39
  year      = {2016}
40
 }
41

  
42
@article{BellantoniCook92,
43
  author    = {Stephen Bellantoni and
44
               Stephen A. Cook},
45
  title     = {A New Recursion-Theoretic Characterization of the Polytime Functions},
46
  journal   = {Computational Complexity},
47
  volume    = {2},
48
  pages     = {97--110},
49
  year      = {1992}
50
 }
51

  
52
@inproceedings{Cobham,
53
	author = {Cobham, A.},
54
	title = {On the intrinsic computational difficulty of functions},
55
	booktitle={Proc. of the 1964 International Congress for Logic, Methodology, and the Philosophy
56
	of Science},
57
	year = {1964},
58
	issn = {0001-0782},
59
	pages = {24--30},
60
		publisher = {North Holland, Amsterdam}
61
} 
62

  
63

  
64
@article{Dershowitz:1979:PTM:359138.359142,
65
	author = {Dershowitz, Nachum and Manna, Zohar},
66
	title = {Proving Termination with Multiset Orderings},
67
	journal = {Commun. ACM},
68
	issue_date = {Aug. 1979},
69
	volume = {22},
70
	number = {8},
71
	month = aug,
72
	year = {1979},
73
	issn = {0001-0782},
74
	pages = {465--476},
75
	numpages = {12},
76
	doi = {10.1145/359138.359142},
77
	acmid = {359142},
78
	publisher = {ACM},
79
	address = {New York, NY, USA},
80
	keywords = {bags, multisets, production systems, program correctness, program termination, program verification, reduction rules, term rewriting systems, tree replacement systems, well-founded orderings, well-founded sets},
81
} 
82

  
83

  
84

  
85
@article{Beckmann11,
86
  author    = {Arnold Beckmann and
87
               Samuel R. Buss},
88
  title     = {Corrected upper bounds for free-cut elimination},
89
  journal   = {Theor. Comput. Sci.},
90
  volume    = {412},
91
  number    = {39},
92
  pages     = {5433--5445},
93
  year      = {2011}
94
}
95

  
96

  
97
@Phdthesis{BellantoniThesis,
98
author={Stephen J. Bellantoni},
99
title={Predicative Recursion and Computational Complexity},
100
school={University of Toronto},
101
year={1992}
102
}
103

  
104
@article{BelHof:02,
105
  author    = {Stephen Bellantoni and
106
               Martin Hofmann},
107
  title     = {A New "Feasible" Arithmetic},
108
  journal   = {J. Symb. Log.},
109
  volume    = {67},
110
  number    = {1},
111
  pages     = {104--116},
112
  year      = {2002}
113
 }
114

  
115
@article{Girard98,
116
  author    = {Jean{-}Yves Girard},
117
  title     = {Light Linear Logic},
118
  journal   = {Inf. Comput.},
119
  volume    = {143},
120
  number    = {2},
121
  pages     = {175--204},
122
  year      = {1998}
123
 }
124

  
125
@article{Hofmann00,
126
  author    = {Martin Hofmann},
127
  title     = {Safe recursion with higher types and BCK-algebra},
128
  journal   = {Ann. Pure Appl. Logic},
129
  volume    = {104},
130
  number    = {1-3},
131
  pages     = {113--166},
132
  year      = {2000}
133
  }
134

  
135
@article{Terui04,
136
  author    = {Kazushige Terui},
137
  title     = {Light Affine Set Theory: {A} Naive Set Theory of Polynomial Time},
138
  journal   = {Studia Logica},
139
  volume    = {77},
140
  number    = {1},
141
  pages     = {9--40},
142
  year      = {2004}
143
  }
144

  
145

  
146
@article{Leivant94:found-delin-ptime,
147
  author    = {Daniel Leivant},
148
  title     = {A Foundational Delineation of Poly-time},
149
  journal   = {Inf. Comput.},
150
  volume    = {110},
151
  number    = {2},
152
  pages     = {391--420},
153
  year      = {1994}
154
  }
155

  
156

  
157
@book{Buss86book,
158
  title={Bounded arithmetic},
159
  author={Buss, Samuel R},
160
  volume={86},
161
  year={1986},
162
  publisher={Bibliopolis}
163
}
164

  
165

  
166
@inproceedings{Leivant94:intrinsic-theories,
167
  author    = {Daniel Leivant},
168
  title={Intrinsic Theories and Computational Complexity},
169
  booktitle     = {Logical and Computational Complexity. Selected Papers. Logic and Computational
170
               Complexity, International Workshop {LCC} '94, Indianapolis, Indiana,
171
               USA, 13-16 October 1994},
172
  series    = {Lecture Notes in Computer Science},
173
  volume    = {960},
174
  pages={177-194},
175
  publisher = {Springer},
176
  year      = {1995}
177
  
178
}
179

  
180
@article{Cantini02,
181
  author    = {Andrea Cantini},
182
  title     = {Polytime, combinatory logic and positive safe induction},
183
  journal   = {Arch. Math. Log.},
184
  volume    = {41},
185
  number    = {2},
186
  pages     = {169--189},
187
  year      = {2002}
188
  }
189

  
190
@inproceedings{Girard94:lll,
191
  author    = {Jean{-}Yves Girard},
192
  title     = {Light Linear Logic},
193
  booktitle = {Logical and Computational Complexity. Selected Papers. {LCC} '94.},
194
  pages     = {145--176},
195
  year      = {1994},
196
  crossref  = {DBLP:conf/lcc/1994},
197
  doi       = {10.1007/3-540-60178-3_83},
198
  timestamp = {Thu, 23 Jun 2011 19:50:18 +0200},
199
  bibsource = {dblp computer science bibliography, http://dblp.org}
200
 }
201

  
202

  
203
@article{LincolnMSS92,
204
  author    = {Patrick Lincoln and
205
               John C. Mitchell and
206
               Andre Scedrov and
207
               Natarajan Shankar},
208
  title     = {Decision Problems for Propositional Linear Logic},
209
  journal   = {Ann. Pure Appl. Logic},
210
  volume    = {56},
211
  number    = {1-3},
212
  pages     = {239--311},
213
  year      = {1992}
214
 }
215

  
216
@article{Murawski04,
217
  author    = {Andrzej S. Murawski and
218
               C.{-}H. Luke Ong},
219
  title     = {On an interpretation of safe recursion in light affine logic},
220
  journal   = {Theor. Comput. Sci.},
221
  volume    = {318},
222
  number    = {1-2},
223
  pages     = {197--223},
224
  year      = {2004}
225
}
226

  
227
@article{Avron88,
228
  author    = {Arnon Avron},
229
  title     = {The Semantics and Proof Theory of Linear Logic},
230
  journal   = {Theor. Comput. Sci.},
231
  volume    = {57},
232
  pages     = {161--184},
233
  year      = {1988}
234
 
235
}
236
@article{GirardSS92:bounded-ll,
237
  author    = {Jean{-}Yves Girard and
238
               Andre Scedrov and
239
               Philip J. Scott},
240
  title     = {Bounded Linear Logic: {A} Modular Approach to Polynomial-Time Computability},
241
  journal   = {Theor. Comput. Sci.},
242
  volume    = {97},
243
  number    = {1},
244
  pages     = {1--66},
245
  year      = {1992}
246
 }
247

  
248
@article{Lafont04,
249
  author    = {Yves Lafont},
250
  title     = {Soft linear logic and polynomial time},
251
  journal   = {Theor. Comput. Sci.},
252
  volume    = {318},
253
  number    = {1-2},
254
  pages     = {163--180},
255
  year      = {2004}
256
 }
257

  
258

  
259
@inproceedings{Lasson11,
260
  author    = {Marc Lasson},
261
  title     = {Controlling Program Extraction in Light Logics},
262
  booktitle = {Typed Lambda Calculi and Applications - 10th International Conference,
263
               {TLCA} 2011, Novi Sad, Serbia, June 1-3, 2011. Proceedings},
264
  pages     = {123--137},
265
  series    = {Lecture Notes in Computer Science},
266
  volume    = {6690},
267
  publisher = {Springer},
268
  year      = {2011}
269
 }
270

  
271
@book{Takeuti87,
272
  title={Proof Theory},
273
  author={Takeuti, G.},
274
  year={1987},
275
  publisher={North-Holland, Amsterdam},
276
  note={and ed.}
277
}
278
@article{Girard87,
279
  author    = {Jean{-}Yves Girard},
280
  title     = {Linear Logic},
281
  journal   = {Theor. Comput. Sci.},
282
  volume    = {50},
283
  pages     = {1--102},
284
  year      = {1987},
285
  url       = {http://dx.doi.org/10.1016/0304-3975(87)90045-4},
286
  doi       = {10.1016/0304-3975(87)90045-4},
287
  timestamp = {Wed, 07 Sep 2011 12:13:20 +0200},
288
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/Girard87},
289
  bibsource = {dblp computer science bibliography, http://dblp.org}
290
}
291

  
292

  
293
@article{Buss98:intro-proof-theory,
294
  title={An introduction to proof theory},
295
  author={Buss, Samuel R},
296
  journal={Handbook of proof theory},
297
  volume={137},
298
  pages={1--78},
299
  year={1998}
300
}
301
@incollection{Miller04,
302
	year = {2004},
303
	author = {Dale Miller},
304
	editor = {Thomas Ehrhard},
305
	pages = {316--119},
306
	booktitle = {Linear Logic in Computer Science},
307
	publisher = {Cambridge University Press},
308
	title = {Overview of Linear Logic Programming}
309
}
310

  
311

  
312

  
313

  
314
@article{Andreoli92,
315
	author    = {Jean{-}Marc Andreoli},
316
	title     = {Logic Programming with Focusing Proofs in Linear Logic},
317
	journal   = {J. Log. Comput.},
318
	volume    = {2},
319
	number    = {3},
320
	pages     = {297--347},
321
	year      = {1992},
322
	doi       = {10.1093/logcom/2.3.297},
323
	timestamp = {Wed, 29 Jun 2011 15:52:24 +0200},
324
	bibsource = {dblp computer science bibliography, http://dblp.org}
325
}
326
@article{FriedmanM92,
327
	author    = {Harvey Friedman and
328
	Robert K. Meyer},
329
	title     = {Whither Relevant Arithmetic?},
330
	journal   = {J. Symb. Log.},
331
	volume    = {57},
332
	number    = {3},
333
	pages     = {824--831},
334
	year      = {1992},
335
	doi       = {10.2307/2275433},
336
	timestamp = {Tue, 05 Aug 2014 16:36:24 +0200},
337
	bibsource = {dblp computer science bibliography, http://dblp.org}
338
}
339

  
340

  
341

  
342
@inproceedings{Marion01,
343
  author    = {Jean{-}Yves Marion},
344
  title     = {Actual Arithmetic and Feasibility},
345
  booktitle = {Proceedings of Computer Science Logic (CSL 2001)} ,
346
    pages     = {115--129},
347
   series    = {Lecture Notes in Computer Science},
348
  volume    = {2142},
349
  publisher = {Springer},
350
  year      = {2001}
351
  }
352

  
353

  
354

  
355

  
356

  
357
@book{Cook:2010:LFP:1734064,
358
	author = {Cook, Stephen and Nguyen, Phuong},
359
	title = {Logical Foundations of Proof Complexity},
360
	year = {2010},
361
	isbn = {052151729X, 9780521517294},
362
	edition = {1st},
363
	publisher = {Cambridge University Press},
364
	address = {New York, NY, USA},
365
} 
366

  
367
@article{Baillot15,
368
	author    = {Patrick Baillot},
369
	title     = {On the expressivity of elementary linear logic: Characterizing Ptime
370
	and an exponential time hierarchy},
371
	journal   = {Inf. Comput.},
372
	volume    = {241},
373
	pages     = {3--31},
374
	year      = {2015},
375
	url       = {http://dx.doi.org/10.1016/j.ic.2014.10.005},
376
	doi       = {10.1016/j.ic.2014.10.005},
377
	timestamp = {Sat, 25 Apr 2015 11:14:59 +0200},
378
	biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iandc/Baillot15},
379
	bibsource = {dblp computer science bibliography, http://dblp.org}
380
}
381

  
382
@inproceedings{BaiDas16,
383
	author    = {Patrick Baillot and
384
	Anupam Das},
385
	title     = {Free-Cut Elimination in Linear Logic and an Application to a Feasible
386
	Arithmetic},
387
	booktitle = {25th {EACSL} Annual Conference on Computer Science Logic, {CSL} 2016,
388
	August 29 - September 1, 2016, Marseille, France},
389
	pages     = {40:1--40:18},
390
	year      = {2016},
391
	crossref  = {DBLP:conf/csl/2016},
392
	url       = {http://dx.doi.org/10.4230/LIPIcs.CSL.2016.40},
393
	doi       = {10.4230/LIPIcs.CSL.2016.40},
394
	timestamp = {Tue, 30 Aug 2016 15:55:10 +0200},
395
	biburl    = {http://dblp.uni-trier.de/rec/bib/conf/csl/BaillotD16},
396
	bibsource = {dblp computer science bibliography, http://dblp.org}
397
}
398

  
399

  
400

  
401

  
402

  
403
@book{Krajicek:1996:BAP:225488,
404
	author = {Kraj\'{\i}\v{c}ek, Jan},
405
	title = {Bounded arithmetic, propositional logic, and complexity theory},
406
	year = {1995},
407
	isbn = {0-521-45205-8},
408
	publisher = {Cambridge University Press},
409
	address = {New York, NY, USA},
410
} 
411

  
412

  
413
@incollection{CloTak:1995:nc-ac,
414
	title={First order bounded arithmetic and small boolean circuit complexity classes},
415
	author={Clote, Peter and Takeuti, Gaisi},
416
	booktitle={Feasible Mathematics II},
417
	pages={154--218},
418
	year={1995},
419
	publisher={Springer}
420
}
421

  
422

  
423
@article{Strahm03,
424
  author    = {Thomas Strahm},
425
  title     = {Theories with self-application and computational complexity},
426
  journal   = {Inf. Comput.},
427
  volume    = {185},
428
  number    = {2},
429
  pages     = {263--297},
430
  year      = {2003},
431
  url       = {http://dx.doi.org/10.1016/S0890-5401(03)00086-5},
432
  doi       = {10.1016/S0890-5401(03)00086-5},
433
  timestamp = {Thu, 20 Nov 2003 12:03:25 +0100},
434
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iandc/Strahm03},
435
  bibsource = {dblp computer science bibliography, http://dblp.org}
436
}
437
@article{Zambella96,
438
	author    = {Domenico Zambella},
439
	title     = {Notes on Polynomially Bounded Arithmetic},
440
	journal   = {J. Symb. Log.},
441
	volume    = {61},
442
	number    = {3},
443
	pages     = {942--966},
444
	year      = {1996},
445
	url       = {http://dx.doi.org/10.2307/2275794},
446
	doi       = {10.2307/2275794},
447
	timestamp = {Tue, 05 Aug 2014 16:36:22 +0200},
448
	biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jsyml/Zambella96},
449
	bibsource = {dblp computer science bibliography, http://dblp.org}
450
}
451

  
452

  
453
@article{KahOit:13:ph-levels,
454
	author    = {Reinhard Kahle and
455
	Isabel Oitavem},
456
	title     = {Applicative theories for the polynomial hierarchy of time and its
457
	levels},
458
	journal   = {Ann. Pure Appl. Logic},
459
	volume    = {164},
460
	number    = {6},
461
	pages     = {663--675},
462
	year      = {2013},
463
	url       = {http://dx.doi.org/10.1016/j.apal.2012.05.006},
464
	doi       = {10.1016/j.apal.2012.05.006},
465
	timestamp = {Sat, 20 Apr 2013 19:07:47 +0200},
466
	biburl    = {http://dblp.uni-trier.de/rec/bib/journals/apal/KahleO13},
467
	bibsource = {dblp computer science bibliography, http://dblp.org}
468
}
469

  
470

  
471
@article{Buss:95:wfm-arith,
472
	title={The witness function method and provably recursive functions of Peano arithmetic},
473
	author={Buss, Samuel R},
474
	journal={Studies in Logic and the Foundations of Mathematics},
475
	volume={134},
476
	pages={29--68},
477
	year={1995},
478
	publisher={Elsevier}
479
}
480

  
481

  
482

  
483
	@article{troelstra1998realizability,
484
		title={Realizability},
485
		author={Troelstra, Anne Sjerp},
486
		journal={Handbook of Proof Theory},
487
		year={1998},
488
		publisher={North-Holland/Elsevier}
489
	}
490
	@article{avigad1998godel,
491
		title={G{\"o}del’s functional (“{D}ialectica”) interpretation},
492
		author={Avigad, Jeremy},
493
		journal={Handbook of Proof Theory},
494
		volume={137},
495
		year={1998}
496
	}
497

  
498

  
499

  
500

  
501

  

Formats disponibles : Unified diff