Révision 203 CSL17/intro.tex
intro.tex (revision 203) | ||
---|---|---|
1 | 1 |
\section{Introduction and motivation} |
2 | 2 |
\label{sect:intro} |
3 | 3 |
|
4 |
\anupam{Copied below from DICE submission} |
|
5 |
|
|
6 | 4 |
Today, there are countless approaches towards characterising complexity classes via logic. |
7 | 5 |
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory. |
8 | 6 |
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}. |
9 | 7 |
|
10 | 8 |
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class. |
11 |
Perhaps a more important (and somewhat orthogonal) distinction for the \textsc{Dice-Fopara} community is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}. |
|
9 |
But a more important (and somewhat orthogonal) distinction is whether the constraints on the logic or theory are |
|
10 |
\textit{explicit} or \textit{implicit}, that is to say whether they stipulate some bounds or resources, or whether the bounds are only \textit{consequence} of some logical properties. One important representant of the first category is \textit{bounded arithmetic}, which has been investigated by Buss \cite{Buss86book}, as a first-order arithmetic with bounded quantifiers. Cobham's function algebra \cite{Cobham} for polynomial time is of a similar nature, and indeed is used as a tool for the study of bounded arithmetic. In the second category one can range the systems of \textit{implicit computational complexity}, like for instance function algebras based on restrictions of recursion, such as ramified or safe recursion \cite{BellantoniCook}, arithmetics or logics based on analogous restrictions of induction \cite{Cantini02}, \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, \cite{Leivant94:found-delin-ptime} and subsystems of linear logic \cite{Girard94:lll} \cite{Lafont04} . |
|
12 | 11 |
|
13 |
Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}. |
|
14 |
|
|
15 |
In this line of work we attempt to ameliorate the situation by using implicit methods to delineate fine-grained hierarchies of feasible complexity classes, namely the \emph{polynomial hierarchy}, $\ph$. |
|
16 |
One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}. |
|
17 |
In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories. |
|
18 |
This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}. |
|
19 |
|
|
20 |
\subsection{State of the art} |
|
21 |
As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory. |
|
22 |
As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.} |
|
23 |
%, distinguished by the type level of programs extracted: |
|
24 |
|
|
25 |
\bigskip |
|
26 |
|
|
27 |
\begin{tabular}{c|c|c} |
|
28 |
Class & Ground & Higher order\\ |
|
29 |
\hline |
|
30 |
% quantifiers & type-level\\ |
|
31 |
$\nc^i$ & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\ |
|
32 |
$\ptime$ & $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\ |
|
33 |
$\Box_i$ & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & - \\ |
|
34 |
$\ph$& $S_2$ & - \\ |
|
35 |
$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\ |
|
36 |
% $k$-$\exptime$ & - & $\mathit{ELL}(k)$ \\ |
|
37 |
Elementary & $I\Delta_0 + \exp$ & $\mathit{ELL}\; \cite{Girard94:lll}$ |
|
38 |
\end{tabular} |
|
39 |
|
|
40 |
\bigskip |
|
41 |
|
|
42 |
\noindent |
|
43 |
Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'. |
|
44 |
%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture. |
|
12 |
Bounded arithmetic is a deep and well-established theory, and one of its interests is its great versatility, as it has enabled to characterize a wide range of complexity classes, such as FP, the polynomial hierarchy FPH, PSPACE, NC \dots It is also tightly related to \textit{proof complexity} |
|
13 |
\cite{Cook:2010:LFP:1734064}, the research field investigating the size of propositional proofs in various proof systems. Finally it is also employed for the research direction of \textit{bounded reverse mathematics}. |
|
14 |
|
|
15 |
Implicit computational complexity on the other hand is a slightly more recent and less unified line of research. It has the interest of delineating some specific computing disciplines which correspond to classical complexity classes and can help shed some light for instance on the foundational nature of feasibility (see e.g. \cite{Leivant94:found-delin-ptime}). Another benefit is that implicit complexity systems can sometimes be extended into techniques for statically controlling the complexity of programs, e.g. in functional or imperative languages (\cite{Hofmann99SLR,Hofmann00}, \cite{Marion11} \dots). However the variety of complexity classes that have been characterized in this implicit way is not as large as for bounded arithmetic. In particular implicit complexity has not managed to characterize non-deterministic classes, such as NP or PH, in a purely logical way. Actually some characterizations of such classes do exist, but they either take the form of a function algebra or of a type system extended with a non-logical feature. |
|
16 |
|
|
17 |
In fact implicit complexity has taken many of its techniques from a detailed study of the comprehension scheme, of recursion and of the structural rules of proof systems (contraction rule). But it seems to us that first-order quantification has not been investigated as much as it deserves. We believe that this is one reason of the modest achievements of implicit complexity concerning non-deterministic classes. |
|
18 |
|
|
19 |
\patrick{ |
|
20 |
\begin{itemize} |
|
21 |
\item our goal: design an unbounded arithmetic for FPH. |
|
22 |
|
|
23 |
motivations: bridge bounded arithmetic and ICC ; enlarge the toolbox of ICC |
|
24 |
\item methodology: use ramification, and calibrate the logic by alternance of quantifiers in induction formulas |
|
25 |
\item key idea: replace the role of bounded quantifiers by safe quantifiers |
|
26 |
\item related works |
|
27 |
\end{itemize} |
|
28 |
} |
|
45 | 29 |
% |
46 |
% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several |
|
47 |
Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular: |
|
48 |
\begin{itemize} |
|
49 |
\item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra; |
|
50 |
\item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra. |
|
51 |
\end{itemize} |
|
52 |
We classify some known characterisations from the literature according to these two parameters in the following table: |
|
53 |
\bigskip |
|
54 |
|
|
55 |
\begin{tabular}{c|c|c} |
|
56 |
{ |
|
57 |
%\small model of comp. $\backslash$ extracted program |
|
58 |
} & bounded rec. programs & tiered rec. programs \\ |
|
59 |
\hline &&\\ |
|
60 |
formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\ |
|
61 |
% & bounded induction (Buss \cite{Buss86book}) &\\ |
|
62 |
\hline &&\\ |
|
63 |
equational && $\ptime$\\ |
|
64 |
&& (Leivant \cite{Leivant94:intrinsic-theories}) \\ |
|
65 |
\hline &&\\ |
|
66 |
applicative & $\ptime$ (Strahm \cite{Strahm03}) & $\ptime$ \\ |
|
67 |
&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02}) |
|
68 |
\end{tabular} |
|
69 |
|
|
70 |
%TODO: improve table to make clear columns and rows, explicit and implicit columns. |
|
30 |
%\anupam{Copied below from DICE submission} |
|
71 | 31 |
% |
72 |
%\begin{tabular}{c|c|c|c} |
|
32 |
%Today, there are countless approaches towards characterising complexity classes via logic. |
|
33 |
%Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory. |
|
34 |
%Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}. |
|
35 |
% |
|
36 |
%To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class. |
|
37 |
%Perhaps a more important (and somewhat orthogonal) distinction for the \textsc{Dice-Fopara} community is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}. |
|
38 |
% |
|
39 |
%Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}. |
|
40 |
% |
|
41 |
%In this line of work we attempt to ameliorate the situation by using implicit methods to delineate fine-grained hierarchies of feasible complexity classes, namely the \emph{polynomial hierarchy}, $\ph$. |
|
42 |
%One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}. |
|
43 |
%In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories. |
|
44 |
%This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}. |
|
45 |
% |
|
46 |
%\subsection{State of the art} |
|
47 |
%As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory. |
|
48 |
%As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.} |
|
49 |
%%, distinguished by the type level of programs extracted: |
|
50 |
% |
|
51 |
%\bigskip |
|
52 |
% |
|
53 |
%\begin{tabular}{c|c|c} |
|
54 |
% Class & Ground & Higher order\\ |
|
55 |
% \hline |
|
56 |
% % quantifiers & type-level\\ |
|
57 |
% $\nc^i$ & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\ |
|
58 |
% $\ptime$ & $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\ |
|
59 |
% $\Box_i$ & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & - \\ |
|
60 |
% $\ph$& $S_2$ & - \\ |
|
61 |
% $\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\ |
|
62 |
% % $k$-$\exptime$ & - & $\mathit{ELL}(k)$ \\ |
|
63 |
% Elementary & $I\Delta_0 + \exp$ & $\mathit{ELL}\; \cite{Girard94:lll}$ |
|
64 |
%\end{tabular} |
|
65 |
% |
|
66 |
%\bigskip |
|
67 |
% |
|
68 |
%\noindent |
|
69 |
%Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'. |
|
70 |
%%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture. |
|
71 |
%% |
|
72 |
%% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several |
|
73 |
%Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular: |
|
74 |
%\begin{itemize} |
|
75 |
% \item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra; |
|
76 |
% \item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra. |
|
77 |
%\end{itemize} |
|
78 |
%We classify some known characterisations from the literature according to these two parameters in the following table: |
|
79 |
%\bigskip |
|
80 |
% |
|
81 |
%\begin{tabular}{c|c|c} |
|
73 | 82 |
% { |
74 | 83 |
% %\small model of comp. $\backslash$ extracted program |
75 |
% } & Cobham & mon. constraints & BC-like \\
|
|
84 |
% } & bounded rec. programs & tiered rec. programs \\
|
|
76 | 85 |
% \hline &&\\ |
77 |
% formula & PH, $\square_i$&&\\
|
|
78 |
% & bounded induction (Buss) &&\\
|
|
86 |
% formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
|
|
87 |
% % & bounded induction (Buss \cite{Buss86book}) &\\
|
|
79 | 88 |
% \hline &&\\ |
80 |
% equational &&& P\\
|
|
81 |
% &&& (Leivant) \\
|
|
89 |
% equational && $\ptime$\\
|
|
90 |
% && (Leivant \cite{Leivant94:intrinsic-theories}) \\
|
|
82 | 91 |
% \hline &&\\ |
83 |
% applicative &&PH & P \\
|
|
84 |
% &&(Kahle-Oitavem)& (Cantini)
|
|
92 |
% applicative & $\ptime$ (Strahm \cite{Strahm03}) & $\ptime$ \\
|
|
93 |
% &$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
|
|
85 | 94 |
%\end{tabular} |
86 |
|
|
87 |
\bigskip |
|
88 |
|
|
89 |
\noindent |
|
90 |
Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\ $\ph$ and its levels $\square_i$. |
|
91 |
%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy. |
|
95 |
% |
|
96 |
%%TODO: improve table to make clear columns and rows, explicit and implicit columns. |
|
97 |
%% |
|
98 |
%%\begin{tabular}{c|c|c|c} |
|
99 |
%% { |
|
100 |
%% %\small model of comp. $\backslash$ extracted program |
|
101 |
%% } & Cobham & mon. constraints & BC-like \\ |
|
102 |
%% \hline &&\\ |
|
103 |
%% formula & PH, $\square_i$&&\\ |
|
104 |
%% & bounded induction (Buss) &&\\ |
|
105 |
%% \hline &&\\ |
|
106 |
%% equational &&& P\\ |
|
107 |
%% &&& (Leivant) \\ |
|
108 |
%% \hline &&\\ |
|
109 |
%% applicative &&PH & P \\ |
|
110 |
%% &&(Kahle-Oitavem)& (Cantini) |
|
111 |
%%\end{tabular} |
|
112 |
% |
|
113 |
%\bigskip |
|
114 |
% |
|
115 |
%\noindent |
|
116 |
%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\ $\ph$ and its levels $\square_i$. |
|
117 |
%%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy. |
Formats disponibles : Unified diff