Statistiques
| Révision :

root / CSL17 / tech-report / intro.tex @ 257

Historique | Voir | Annoter | Télécharger (18,16 ko)

1 251 adas
\section{Introduction and motivation}
2 251 adas
\label{sect:intro}
3 251 adas
4 251 adas
Today, there are countless approaches towards characterising complexity classes via logic.
5 251 adas
Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
6 251 adas
Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
7 251 adas
8 251 adas
To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
9 251 adas
But a perhaps more important distinction is whether the constraints on the logic or theory are
10 253 pbaillot
\textit{explicit} or \textit{implicit}, that is to say whether they stipulate some bounds or resources, or whether the bounds are only \textit{consequence} of some logical properties. One important representative of the first category is \textit{bounded arithmetic}, based on theories of arithmetic where quantifiers are bounded by terms in induction or comprehension formulae \cite{Buss86book,Krajicek:1996:BAP:225488,Cook:2010:LFP:1734064}. Cobham's function algebra  \cite{Cobham}  for polynomial time is of a similar nature, and indeed is used as a tool for the study of bounded arithmetic. In the second category there are various systems of \textit{implicit computational complexity}, for instance function algebras based on \emph{ramification} or \emph{safe recursion} \cite{BellantoniCook92,Leivant95}, arithmetics or logics based on analogous restrictions of induction \cite{Cantini02},  \cite{Leivant94:intrinsic-theories} \cite{BelHof:02},  \cite{Marion01}, \cite{Leivant94:found-delin-ptime} and subsystems of \emph{linear logic} \cite{Girard94:lll} \cite{Lafont04} .
11 251 adas
12 251 adas
 Bounded arithmetic is a deep and well-established field, and one of its advantages is its great versatility, allowing a characterization of a wide range of complexity classes, such as $\ptime$, the polynomial hierarchy $\ph$, $\pspace$, $\mathbf{NC}^i$ etc.
13 251 adas
 %It is also closely related to \textit{proof complexity}, the research field investigating the size of propositional proofs in various proof systems. Finally it is also employed for the research direction of \textit{bounded reverse mathematics}.
14 251 adas
  %
15 251 adas
  Implicit computational complexity on the other hand is a slightly more recent and less unified field of research. It aims to relate certain computing disciplines with complexity theoretic features, and has helped shed some light on the foundational nature of `feasibility' (see e.g.~\cite{Leivant94:found-delin-ptime}).
16 251 adas
  Another benefit is that implicit complexity systems can sometimes be extended into techniques for statically controlling the complexity of programs, e.g. in functional or imperative languages (e.g. \cite{Hofmann00,Hofmann03}, \cite{Marion11}).  However the variety of complexity classes that have been characterized in this implicit way is not as large as for bounded arithmetic. In particular implicit complexity has not managed to characterize non-deterministic classes, such as $\mathbf{NP}$ or $\ph$, in a purely logical way.\footnote{Actually some characterizations of such classes do exist, but they either take the form of a function algebra \cite{bellantoni1995fph} or of a type system extended with a non-logical feature \cite{GaboardiMarionRonchi12}.}
17 251 adas
18 251 adas
 Systems in implicit complexity typically imposes constraints on the comprehension scheme, the recursion/induction scheme or the structural rules of proof systems (namely \emph{contraction}).
19 251 adas
% But it seems to us that first-order quantification has not yet been investigated as much as it deserves. We believe that this is one reason of the modest achievements of implicit complexity concerning non-deterministic classes.
20 251 adas
%
21 251 adas
  In the present work we aim to bridge the gap to bounded arithmetic by constructing `implicit' theories that characterise the functional polynomial hierarchy $\fph$ and its levels. We consider a base theory similar to that of bounded arithmetic, but we allow induction on \emph{unbounded} formulae, i.e.\ without any explicit bounds.
22 251 adas
%  By implicit complexity arithmetic we mean that the quantifiers employed should not be bounded quantifiers. Our motivation is to bridge the fields of bounded arithmetic and implicit complexity, and to try pave the way for the design of systems bringing together simplicity (no explicit bounds) and versatility, in which one could transfer some of the main results of bounded arithmetic.
23 251 adas
%
24 251 adas
%  Our methodology will be the following one:
25 251 adas
Naturally another constraint is in order, and for this we will use the concept of \textit{ramification} that is common in implicit complexity \cite{Leivant95,BellantoniCook92}.
26 251 adas
%, adapt it in the setting of first-order arithmetic, and then explore some properties relative to quantification. First
27 251 adas
28 251 adas
Similar to \emph{safe recursion}, ramification is a discipline which aims at limiting the power of recursion by distinguishing two (or more) levels of integers: the \textit{safe} or level-0 integers and the \textit{normal} or level-1 ones.
29 251 adas
In a nutshell, recursion is permitted on normal arguments, but recursive calls can only appear in safe positions. Basic operations, such as conditionals and Boolean predicates, can be performed on safe arguments.
30 251 adas
Functions defined in this way correspond to polynomial time functions \cite{BellantoniCook92}.
31 251 adas
32 251 adas
  This discipline can be transposed into first-order arithmetic by adding predicates for normal and safe integers, in this work $\normal$ and $\safe$ respectively, and by limiting the induction scheme by allowing induction only on normal integers, but crucially with inductive invariants containing only \emph{safe} unbounded quantifiers.
33 251 adas
  %The key step we make is to focus our attention on \textit{safe quantifiers} that is to say quantifiers on safe variables.
34 251 adas
  These safe quantifiers play a r\^ole analogous to bounded quantifiers in bounded arithmetic. In particular we will consider a hierarchy $\Sigma_i^{\safe}$ of formulas, according to the number of alternations of safe quantifiers, to define a hierarchy of theories $\arith^i$ allowing induction on $\Sigma^\safe_i$ formulae.
35 251 adas
  We show that such a theory proves the totality of precisely the $\fph_i$ functions, relying on a recursion-theoretic characterisation of $\fph$ due to Bellantoni \cite{bellantoni1995fph} to both extract programs and prove completeness of the theory with respect to $\fph_i$.
36 251 adas
37 251 adas
  \medskip
38 251 adas
  \noindent
39 251 adas
  \textbf{Related work}. To the best of our knowledge, our work is the first characterization of the polynomial hierarchy and its levels in an implicit arithmetic. Our approach is however related to several previous works, and differs either by some of the definitions and/or by the complexity class characterized.
40 251 adas
  One particular difference is that we specify programs using arithmetic formulae, as in bounded arithmetic, rather than equational specifications or combinatory terms in other works, which seems to be important for characterizing $\fph$.
41 251 adas
42 251 adas
%   A first axis of classification between the logics and arithmetics for complexity classes is the way by which they specify functions. The options at stake can be enumerated as follows: (i) \textit{formula specification}, as in first-order bounded arithmetic \cite{Buss86book}, (ii) \textit{equational specification}, as in Leivant's intrinsic theories   \cite{Leivant94:intrinsic-theories}, (iii) \textit{combinatory terms} as in applicative theories (e.g. \cite{Strahm03}) or $\lambda$-calculus terms. A second axis, as explained in the introduction, is whether the system is explicit or implicit.
43 251 adas
%
44 251 adas
%   Our approach in this paper is to use the formula-specification point of view, because it is convenient for the polynomial hierarchy.
45 251 adas
   The arithmetic of \cite{KahOit:13:ph-levels} characterizes $\fph$, but it is not implicit, relying on axioms defining bounded schemes.
46 251 adas
%   Some other works are closer to our methodology in the sense that they are implicit arithmetics and rely on a notion of ramification, but they characterize other complexity classes.
47 251 adas
   Leivant's intrinsic theories \cite{Leivant94:intrinsic-theories}  induces characterizations of $\fptime$ and the Kalm\'ar elementary functions, using equational specifications, and \cite{Cantini02} obtains an analogous result for $\fptime$ using combinatory terms.
48 251 adas
   The paper \cite{BelHof:02} also provides a characterization of $\fptime$, with two differences: on the one hand induction is on arbitrarily quantified formulas, and on the other hand the underlying logic is not classical logic but a variant of linear logic, with a modality for normal arguments. Our paper \cite{BaillotDas16} proves a similar result, but with a different method.
49 251 adas
   The lack of contraction is crucial here to stop the theory from exhausting higher complexity classes.
50 251 adas
   Finally the paper \cite{OstrinWainer05} also presents an implicit ramified arithmetic, with quantification on safe variables. Here equational specifications are used instead of formulas and unary integers  instead of binary integers, which leads to a characterization of the Kalm\'ar elementary functions.
51 251 adas
52 251 adas
  \medskip
53 251 adas
  \noindent
54 251 adas
  \textbf{Outline.} The rest of this paper proceeds as follows. We first give some background on function algebras for $\fptime$ and $\fph$ respectively in Sect.~\ref{sect:prelims}.
55 251 adas
  %Then we describe an encoding of sequences which will be instrumental in the proof of our result.
56 251 adas
  We present our arithmetic theories $\arith^i$ in Sect.~\ref{sect:arithmetic} and give our soundness result, that the provably total functions of $\arith^i$ are in $\fph_i$, in Sect.~\ref{sect:soundness}. Finally, we sketch the completeness result, that all $\fph_i$ functions have a representation provably total in $\arith^i$, in Sect.~\ref{sect:completeness}, and present conclusions in Sect.~\ref{sect:conclusion}.
57 251 adas
58 254 adas
%  We are able to include only brief accounts of our technical results in this paper due to space constraints, in particular for our soundness and completeness results, Thms.~\ref{sect:soundness} and \ref{thm:completeness} respectively.
59 254 adas
%  More detailed proofs can be found in the technical report \cite{BaiDas17:fph-techreport}.
60 251 adas
61 251 adas
62 251 adas
%  \patrick{
63 251 adas
%  \begin{itemize}
64 251 adas
%  \item our goal: design an unbounded arithmetic for FPH.
65 251 adas
%
66 251 adas
%  motivations: bridge bounded arithmetic and ICC ; enlarge the toolbox of ICC
67 251 adas
%  \item methodology: use ramification, and calibrate the logic by alternance of quantifiers in induction formulas
68 251 adas
%  \item key idea: replace the role of bounded quantifiers by safe quantifiers
69 251 adas
%  \item related works
70 251 adas
%  \end{itemize}
71 251 adas
%  }
72 251 adas
%
73 251 adas
%\anupam{Copied below from DICE submission}
74 251 adas
%
75 251 adas
%Today, there are countless approaches towards characterising complexity classes via logic.
76 251 adas
%Foremost amongst these lies the proof-theoretic approach, characterising classes as the `representable' functions of some logic or theory.
77 251 adas
%Examples include bounded arithmetic \cite{Buss86book} \cite{Krajicek:1996:BAP:225488} \cite{Cook:2010:LFP:1734064}, applicative theories \cite{Cantini02} \cite{KahOit:13:ph-levels}, intrinsic and ramified theories \cite{Leivant94:intrinsic-theories} \cite{BelHof:02}, fragments of linear logic \cite{GirardSS92:bounded-ll} \cite{Girard94:lll} \cite{Lafont04} \cite{Baillot15} and fragments of intuitionistic logic \cite{Leivant94:found-delin-ptime}.
78 251 adas
%
79 251 adas
%To some extent there is a distinction between various notions of `representability', namely between logics that \emph{type} terms computing functions of a given complexity class, and theories that prove the \emph{totality} or \emph{convergence} of programs computing functions in a given complexity class.
80 251 adas
%Perhaps a more important (and somewhat orthogonal) distinction for the \textsc{Dice-Fopara} community is whether the constraints on the logic or theory are \emph{implicit} or \emph{explicit}. The former includes constraints such as ramification, type level and substructural considerations, while the latter includes bounded quantification, bounded modalities etc. This distinction is also naturally exhibited in associated function algebras, e.g. Cobham's \emph{limited} recursion on notation \cite{Cobham} vs.\ Bellantoni and Cook's \emph{predicative} recursion on notation \cite{BellantoniCook92}.
81 251 adas
%
82 251 adas
%Some correlations abound: explicit bounds are typically far more useful for more fine-grained characterisations of complexity classes, e.g.\ levels of the polynomial or arithmetical hierarchies, and often admit witness extraction methods that remain in a ground type programming language, e.g.\ via recursion theoretic characterisations. Implicit bounds, however, are more often associated with higher-typed programming languages, which are arguably more useful for achieving witness extraction at all for powerful theories such as arithmetic and set theory, cf.~\cite{avigad1998godel}, \cite{troelstra1998realizability}. Complexity bounds are harder to obtain, but the framework is nonetheless somewhat more desirable since no bounds occur in the characterisation itself \emph{per se}.
83 251 adas
%
84 251 adas
%In this line of work we attempt to ameliorate the situation by using implicit methods to delineate fine-grained hierarchies of feasible complexity classes, namely the \emph{polynomial hierarchy}, $\ph$.
85 251 adas
%One particular feature of this work that helps make this possible is to break one of the aforementioned correlations: while we use implicit constraints, our witness extraction methods will use only functions of bounded type level. In this way we can naturally appeal to function algebras, which are of ground type in nature, which implicitly characterise $\ph$, namely via \emph{predicative minimisation} \cite{BellantoniThesis}.
86 251 adas
%In order to remain in this class of programs and not get lost with higher types, we appeal to the \emph{witness function method} of extracting programs from proofs, a technique developed by Buss \cite{Buss86book} \cite{Buss:95:wfm-arith}, which is ideal for extracting ground programs directly from classical proofs in weak theories.
87 251 adas
%This extends work presented in \cite{BaillotDas16}. %at \emph{CSL '16}.
88 251 adas
%
89 251 adas
%\subsection{State of the art}
90 251 adas
%As we have already argued, it is natural to expect that characterisations of hierarchies such as $\ph$ are more readily established by using ground or bounded type witness extraction procedures, due to the correspondence between logical searches in a program and the quantification over objects of ground type in a theory.
91 251 adas
%As justification for this position, consider the following table of examples of known characterisations:\footnote{All classes can be taken in their functional variations.}
92 251 adas
%%, distinguished by the type level of programs extracted:
93 251 adas
%
94 251 adas
%\bigskip
95 251 adas
%
96 251 adas
%\begin{tabular}{c|c|c}
97 251 adas
%	Class &	Ground & Higher order\\
98 251 adas
%	\hline
99 251 adas
%	%	quantifiers  & type-level\\
100 251 adas
%	$\nc^i$    & $\mathit{TNC}^i$ \cite{CloTak:1995:nc-ac}, $\mathit{VNC}^i$ \cite{Cook:2010:LFP:1734064} & - \\
101 251 adas
%	$\ptime$  &  $S^1_2$ \cite{Buss86book}, \cite{Strahm03}, $V^1$ \cite{Zambella96} \cite{Cook:2010:LFP:1734064} & $\mathit{LLL}$ \cite{Girard94:lll}, $\mathit{SLL}$ \cite{Lafont04} \\
102 251 adas
%	$\Box_i$  & $S^i_2$ \cite{Buss86book}, \cite{KahOit:13:ph-levels} & -  \\
103 251 adas
%	$\ph$& $S_2$ & - \\
104 251 adas
%	$\pspace$& $U^1_2$ \cite{Buss86book} & $\mathit{STA}_B$ \cite{GaboardiMarionRonchi12} \\
105 251 adas
%	%	$k$-$\exptime$ & -  & $\mathit{ELL}(k)$ \\
106 251 adas
%	Elementary & $I\Delta_0 + \exp$  & $\mathit{ELL}\;  \cite{Girard94:lll}$
107 251 adas
%\end{tabular}
108 251 adas
%
109 251 adas
%\bigskip
110 251 adas
%
111 251 adas
%\noindent
112 251 adas
%Thus, if we want an implicit characterisation of $\ph$ in a logical theory, we should break the apparent (although not universal) link between `implicit' and `higher type'.
113 251 adas
%%If we restrict to the ground setting, where extracted programs do not make use of higher types, we have the following picture.
114 251 adas
%%
115 251 adas
%% Now, if we restrict to the ground setting, where extracted programs do not make use of higher types, there are still several
116 251 adas
%Now, if we zoom in on the ground setting, where extracted programs do not make use of higher types, there are still several parameters by which the characterisations can vary, in particular:
117 251 adas
%\begin{itemize}
118 251 adas
%	\item How are programs specified in the language of the theory? By a formula, as in Peano arithmetic, by a first-order equational program, or by an applicative term in the style of combinatory algebra;
119 251 adas
%	\item What type of programs are extracted from proofs of the theory? A program of a bounded recursion class, e.g.\ of Cobham's algebra, or of a tiered recursion class, e.g.\ of Bellantoni and Cook's algebra.
120 251 adas
%\end{itemize}
121 251 adas
%We classify some known characterisations from the literature according to these two parameters in  the following table:
122 251 adas
%\bigskip
123 251 adas
%
124 251 adas
%\begin{tabular}{c|c|c}
125 251 adas
%	{
126 251 adas
%		%\small model of comp. $\backslash$ extracted program
127 251 adas
%	} & bounded rec. programs & tiered rec. programs \\
128 251 adas
%	\hline &&\\
129 251 adas
%	formula & $\ph$, $\square_i$ (Buss \cite{Buss86book})&\\
130 251 adas
%	%	& bounded induction (Buss \cite{Buss86book}) &\\
131 251 adas
%	\hline &&\\
132 251 adas
%	equational && $\ptime$\\
133 251 adas
%	&& (Leivant \cite{Leivant94:intrinsic-theories}) \\
134 251 adas
%	\hline &&\\
135 251 adas
%	applicative & $\ptime$ (Strahm \cite{Strahm03})  & $\ptime$ \\
136 251 adas
%	&$\ph$ (Kahle-Oitavem \cite{KahOit:13:ph-levels})& (Cantini \cite{Cantini02})
137 251 adas
%\end{tabular}
138 251 adas
%
139 251 adas
%%TODO: improve table to make clear columns and rows, explicit and implicit columns.
140 251 adas
%%
141 251 adas
%%\begin{tabular}{c|c|c|c}
142 251 adas
%%	{
143 251 adas
%%		%\small model of comp. $\backslash$ extracted program
144 251 adas
%%		} & Cobham & mon. constraints & BC-like \\
145 251 adas
%%	\hline &&\\
146 251 adas
%%	formula & PH, $\square_i$&&\\
147 251 adas
%%	& bounded induction (Buss) &&\\
148 251 adas
%%	\hline &&\\
149 251 adas
%%	equational &&& P\\
150 251 adas
%%	&&& (Leivant) \\
151 251 adas
%%	\hline &&\\
152 251 adas
%%	applicative &&PH & P \\
153 251 adas
%%	&&(Kahle-Oitavem)& (Cantini)
154 251 adas
%%\end{tabular}
155 251 adas
%
156 251 adas
%\bigskip
157 251 adas
%
158 251 adas
%\noindent
159 251 adas
%Our goal is to extend the approach using extraction of programs of a tiered recursion class (second column), using the equational style of specification (second row), to the whole of the polynomial hierarchy, i.e.\  $\ph$ and its levels $\square_i$.
160 251 adas
%%Our goal is to extend the implicit approach, via variations of Bellantoni-Cook (BC) programs, to the whole of the polynomial hierarchy.