Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-skm99 Total loading time: 0 Render date: 2024-04-26T09:21:42.853Z Has data issue: false hasContentIssue false

Turing and the development of computational complexity

Published online by Cambridge University Press:  05 June 2014

Steven Homer
Affiliation:
Boston University
Alan L. Selman
Affiliation:
State University of New York
Rod Downey
Affiliation:
Victoria University of Wellington
Get access

Summary

Abstract. Turing's beautiful capture of the concept of computability by the “Turing machine” linked computability to a device with explicit steps of operations and use of resources. This invention led in a most natural way to build the foundations for computational complexity.

§1. Introduction. Computational complexity provides mechanisms for classifying combinatorial problems and measuring the computational resources necessary to solve them. The discipline provides explanations of why no practical solutions to certain problems have been found, and provides a way of anticipating difficulties involved in solving these problems. The classification is quantitative and is intended to investigate what resources are necessary, lower bounds, and what resources are sufficient, upper bounds, to solve various problems.

This classification should not depend on a particular computational model but rather should measure the intrinsic difficulty of a problem. Precisely for this reason, as we will explain, the basic model of computation for our study is the multitape Turing machine.

Computational complexity theory today addresses issues of contemporary concern, for example, parallel computation, circuit design, computations that depend on random number generators, and development of efficient algorithms. Above all, computational complexity is interested in distinguishing problems that are efficiently computable. Algorithms whose running times are n2 in the size of their inputs can be implemented to execute efficiently even for fairly large values of n, but algorithms that require an exponential running time can be executed only for small values of n.

Type
Chapter
Information
Turing's Legacy
Developments from Turing's Ideas in Logic
, pp. 299 - 328
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[AH87] L., Adleman and M-D., Huang, Recognizing primes in random polynomial time, Proceedings of the nineteenth annual ACM Symposium on Theory of Computing, 1987, pp. 462-469.
[AM77] L., Adleman and K., Manders, Reducibility, randomness, and intractability, Proceedings of the ninth annual ACM Symposium on Theory of Computing, 1977,pp. 151-163.
[AKS04] M., Agrawal, N., Kayal, and N., Saxena, Primes is in P, Annals of Mathematics, vol. 160 (2004), no. 2, pp. 781-793.Google Scholar
[Ajt83] M., Ajtai, formulea on finite structures, Journal of Pure and Applied Logic, vol. 24 (1983), pp. 1-48.Google Scholar
[AS89] K., Ambos-Spies, On the relative complexity of hard problems for complexity classes without complete problems, Theoretical Computer Science, vol. 63 (1989), pp. 43-61.Google Scholar
[Aro98] S., Arora, Polynomial time approximation schemes for Euclidean traveling salesman and other geometric problems, Journal of the ACM, vol. 45 (1998), no. 5, pp. 753-782.Google Scholar
[ALM+92] S., Arora, C., Lund, R., Motwani, M., Sudan, and M., Szegedy, Proof verification and hardness of approximation problems, Proceedings of the thirty-third symposium on Foundations of Computer Science, IEEE Computer Society, 1992, pp. 14-23.
[AS98] S., Arora and S., Safra, Probabilistic checking of proofs: A new characterization of NP, Journal of the ACM, vol. 45 (1998), no. 1, pp. 70-122.Google Scholar
[Bab85] L., Babai, Trading group theory for randomness, Proceedings of the 17th annual ACM Symposium on Theory of Computing, 1985, pp. 421-429.
[BFLS91] L., Babai, L., Fortnow, L., Levin, and M., Szegedi, Checking computations in polylogarithmic time, Proceedings of the 23rd ACM Symposium on the Theory of Computing, 1991, pp. 21-31.
[BFNW93] L., Babai, L., Fortnow, N., Nisan, and A., Wigderson, BPP has subexponential simulations unless EXPTIME has publishable proofs, Computational Complexity, vol. 3 (1993), pp. 307-318.Google Scholar
[BM84] M., Blum and S., Micali, How to generate cryptographically strong sequences of pseudorandom bits, SIAM Journal on Computing, vol. 13 (1984), pp. 850-864.Google Scholar
[Boo72] R., Book, On languages accepted in polynomial time, SIAM Journal on Computing, vol. 1 (1972), no. 4, pp. 281-287.Google Scholar
[Boo76] R., Book, Translational lemmas, polynomial time, and (log n)j-space, Theoretical Computer Science, vol. 1 (1976), pp. 215-226.Google Scholar
[BG70] R., Book and S., Greibach, Quasi-realtime languages, Mathematical Systems Theory, vol. 4 (1970), pp. 97-111.Google Scholar
[BHZ87] R., Boppana, J., Håstad, and S., Zachos, Does co-NP have short interactive proofs?, Information Processing Letters, vol. 25 (1987), no. 2, pp. 127-132.Google Scholar
[Bor77] A., Borodin, On relating time and space to size and depth, SIAM Journal on Computing, vol. 6 (1977), pp. 733-744.Google Scholar
[CKS81] A., Chandra, D., Kozen, and L., Stockmeyer, Alternation, Journal of the ACM, vol. 28 (1981), no. 1, pp. 114-133.Google Scholar
[Chu36] A., Church, An unsolvable problem of elementary number theory, American Journal of Mathematics, vol. 58 (1936), pp. 345-363.Google Scholar
[Cob64] A., Cobham, The intrinsic computational difficulty of functions, Proceedings of the 1964 international congress for Logic, Methodology, and the Philosophy of Science, North Holland, 1964, pp. 24-30.
[Coo71a] S., Cook, Characterizations of pushdown machines in terms of time-bounded computers, Journal of the ACM, vol. 19 (1971), pp. 175-183.Google Scholar
[Coo71b] S., Cook, The complexity of theorem-proving procedures, Proceedings of the third ACM Symposium on Theory of Computing, 1971, pp. 151-158.
[Coo73] S., Cook, A hierarchy for nondeterministic time complexity, Journal of Computer and System Sciences, vol. 7 (1973), no. 4, pp. 343-353.Google Scholar
[Coo79] S., Cook, Deterministic CFL's are accepted simultaneously in polynomial time and log squared space, Proceedings of the 11th annual ACM Symposium on Theory of of Computing, 1979, pp. 338-345.
[Dav06a] Martin, Davis, The Church–Turing thesis: Consensus and opposition, CiE'06, 2006, pp. 125-132.
[Dav06b] Martin, Davis, Why there is no such discipline as hypercomputation, Applied Mathematics and Computation, (2006), pp. 4-7.
[DL78] R., DeMillo and R., Lipton, A probabilstic remark on algebraic program testing, Information Processing Letters, vol. 7 (1978), no. 4, pp. 193-195.Google Scholar
[Edm65] J., Edmonds, Paths, trees, and flowers, Canadian Journal of Mathematics, vol. 17 (1965), pp. 449-467.Google Scholar
[ET76] S., Even and R., Tarjan, A combinatorial problem which is complete in polynomial space, Journal of the ACM, vol. 23 (1976), pp. 710-719.Google Scholar
[FGL+96] U., Feige, S., Goldwasser, L., Lovasz, S., Safra, and M., Szegedy, Interactive proofs and the hardness of approximating cliques, Journal of the ACM, vol. 43 (1996), pp. 268-292.Google Scholar
[Fel86] P., Feldman, The optimumprover lives in PSPACE, manuscript, 1986.
[FH03] L., Fortnow and S., Homer, A brief history of complexity theory, Bulletin of the European Assocation for Theoretical Computer Science, vol. 80 (2003), pp. 95-133.Google Scholar
[FS11] L., Fortnow and R., Santhanam, Robust simulations and significant separations, Proceedings of the 38th International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, vol. 6755, Springer, 2011, pp. 569-580.
[FSS84] M., Furst, J., Saxe, and M., Sipser, Parity, circuits, and the polynomial-time hierarchy, Mathematical Systems Theory, vol. 17 (1984), no. 1, pp. 13-28.Google Scholar
[GJ79] M., Garey and D., Johnson, Computers and intractability: A guide to the theory of NP-completeness, W. H., Freeman, San Francisco, 1979.
[Gil77] J., Gill, Computational complexity of probabilistic Turing machines, SIAM Journal on Computing, vol. 6 (1977), no. 4, pp. 675-695.Google Scholar
[GKL88] O., Goldreich, H., Krawczyk, and M., Luby, On the existence of pseudorandom generators, Proceedings of the 29th annual IEEE symposium on Foundations of Computer Science, 1988, pp. 12-24.
[GL89] O., Goldreich and L., Levin, Hard-core predicates for any one-way function, Proceedings of the 21st annual ACM Symposium on Theory of Computation, 1989, pp. 25-32.
[GMW91] O., Goldreich, S., Micali, and A., Wigderson, Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proofs, Journal of the ACM, vol. 38 (1991), no. 3, pp. 691-729.Google Scholar
[GMR89] S., Goldwasser, S., Micali, and C., Rackoff, The knowledge complexity of interactive proof systems, SIAM Journal on Computing, vol. 18 (1989), no. 1, pp. 186-208.Google Scholar
[GHR95] R., Greenlaw, H., Hoover, and W., Ruzzo, Limits to parallel computation: P-completeness theory, Oxford University Press, New York, NY, 1995.
[HH86] J., Hartmanis and L., Hemachandra, Complexity classes without machines: on complete languages for UP, Proceedings of the 13th International Colloquium on Automata, Languages, and Programming (Berlin), Lecture Notes in Computer Science, Springer-Verlag, 1986, pp. 123-135.
[HLS65] J., Hartmanis, P., Lewis, and R., Stearns, Hierarchies of memory limited computations, Proceedings of the sixth annual IEEE Symposium on Switching Circuit Theory and Logical Design, 1965, pp. 179-190.
[HS65] J., Hartmanis and R., Stearns, On the computational complexity of algorithms, Transactions of the American Mathematical Society, vol. 117 (1965), pp. 285-306.Google Scholar
[Has99] J., Håstad, Clique is hard to approximate within n1-∈, Acta Mathematica, vol. 182 (1999), pp. 105-142.Google Scholar
[Has01] J., Håstad, Some optimal inapproximabiity results, Journal of the ACM, vol. 48 (2001), pp. 798-849.Google Scholar
[HILL91] J., Håstad, R., Impagliazzo, L., Levin, and M., Luby, Construction of a pseudorandom generator from any one-way function, Technical report, ICSI, Berkely, CA, 1991.
[HS11] S., Homer and A., Selman, Computability and complexity theory, 2nd ed., Texts in Computer Science, Springer-Verlag, New York, NY, December 2011.
[Iba72] O., Ibarra, A note concerning nondeterministic tape complexities, Journal of Computer and System Sciences, vol. 19 (1972), no. 4, pp. 609-612.Google Scholar
[Imm88] N., Immerman, Nondeterministic space is closed under complementation, SIAM Journal on Computing, vol. 17 (1988), no. 5, pp. 935-938.Google Scholar
[IW97] R., Impagliazzo and A., Wigderson, P = BPP if E requires exponential circuits: Derandomizing the XOR lemma, Proceedings of the 29th ACM Symposium on the Theory of Computing, ACM, New York, 1997, pp. 220-229.
[Ins00] Clay Mathematics Institute, Millennium prize problems, http://www.claymath. org/prizeproblems/, 2000.
[Jon73] N., Jones, Reducibility among combinatorial problems in log n space, Proceedings of the seventh annual Princeton Conference on Information Sciences and Systems (Princeton, NJ), Department of Electrical Engineering, Princeton University, 1973, pp. 547-551.
[Jon75] N., Jones, Space-bounded reducibility among combinatorial problems, Journal of Computer and System Sciences, vol. 11 (1975), pp. 68-85.Google Scholar
[JS74] N., Jones and A., Selman, Turing machines and the spectra of first-order formulas, The Journal of Symbolic Logic, vol. 29 (1974), pp. 139-150.Google Scholar
[Kar72] R., Karp, Reducibility among combinatorial problems, Complexity of computer computations, Plenum Press, New York, 1972, pp. 85-104.
[KL80] R., Karp and R., Lipton, Some connections between nonuniform and uniform complexity classes, Proceedings of the twelfth annual ACM Symposium on the Theory of Computing, 1980, an extended version has appeared in L'Enseignement Mathématique, 2nd series 28, 1982, pp. 191–209, pp. 302-309.
[Kur64] S., Kuroda, Classes of languages and linear bounded automata, Information and Control, vol. 7 (1964), no. 2, pp. 207-223.Google Scholar
[LLS75] R., Ladner, N., Lynch, and A., Selman, A comparison of polynomial time reducibilities, Theoretical Computer Science, vol. 1 (1975), pp. 103-123.Google Scholar
[Lau83] C., Lautemann, BPP and the polynomial hierarchy, Information Processing Letters, vol. 17 (1983), pp. 215-217.Google Scholar
[Lev73] L., Levin, Universal sorting problems, Problems of Information Transmission, vol. 9 (1973), pp. 265-266, English translation of original in Problemy Peredaci Informacii.Google Scholar
[LFKN90] C., Lund, L., Fortnow, H., Karloff, and N., Nisan, Algebraic methods for interactive proof systems, Proceedings of the 31st IEEE symposium on Foundations of Computer Science, 1990, pp. 2-10.
[Mag69] G., Mager, Writing pushdown acceptors, Journal of Computer and System Sciences, vol. 3 (1969), no. 3, pp. 276-319.Google Scholar
[MS72] A., Meyer and L., Stockmeyer, The equivalence problem for regular expressions with squaring requires exponential space, Proceedings of the thirteenth IEEE symposium on Switching and Automata Theory, 1972, pp. 125-129.
[Mil76] G., Miller, Reimann's hypothesis and tests for primality, Journal of Computer and System Sciences, vol. 13 (1976), pp. 300-317.Google Scholar
[Myh60] J., Myhill, Linear bounded automata, WADD 60-165, Wright Patterson AFB, Ohio, 1960.
[NW94] N., Nisan and A., Wigderson, Hardness vs. randomness, Journal of Computer and System Sciences, vol. 49 (1994), pp. 149-167.Google Scholar
[PY91] C., Papadimitriou and M., Yannakakis, Optimization, approximation, and complexity classes, Journal of Computer and System Sciences, vol. 43 (1991), pp. 425-440.Google Scholar
[PPST83] W., Paul, N., Pippenger, E., Szemerédi, and W., Trotter, On determinism and non-determinism and related problems, Proceedings of the twenty fourth ACM Symposium on Theory of Computing, 1983, pp. 429-438.
[Pip79] N., Pippenger, On simultaneous resource bounds, Proceedings of the 20th annual IEEE symposium on Foundations of Computer Science, 1979, pp. 307-311.
[PF79] N., Pippenger and M., Fischer, Relations among complexity measures, Journal of the ACM, vol. 26 (1979), pp. 361-381.Google Scholar
[Pra75] V., Pratt, Every prime has a succinct certificate, SIAM Journal on Computing, vol. 4 (1975), pp. 214-220.Google Scholar
[Rab80] M., Rabin, Probabilistic algorithms for testing primality, Journal of Number Theory, vol. 12 (1980), pp. 128-138.Google Scholar
[RS59] M., Rabin and D., Scott, Finite automata and their decision problems, IBM Journal, (1959), pp. 114-125.Google Scholar
[Ros67] A., Rosenberg, Real-time definable languages, Journal of the ACM, vol. 14 (1967), pp. 645-662.Google Scholar
[Sav72] J., Savage, Computational work and time on finite machines, Journal of the ACM, vol. 19 (1972), pp. 660-674.Google Scholar
[Sav70] W., Savitch, Relationships between nondeterministic and deterministic time complexities, Journal of Computer and System Sciences, vol. 4 (1970), no. 2, pp. 177-192.Google Scholar
[Sch80] J. T., Schwartz, Fast probabilistic algorithms for verification of polynomial identities, Journal of the ACM, vol. 27 (1980), pp. 701-717.Google Scholar
[Sha90] A., Shamir, IP=PSPACE, Proceedings of the 31st IEEE symposium on Foundations of Computer Science, 1990, pp. 145-152.
[Sha49] C., Shannon, The synthesis of two–terminal switching circuits, Bell System Technical Journal, vol. 28 (1949), pp. 59-98.Google Scholar
[SG77] I., Simon and J., Gill, Polynomial reducibilities and upward diagonalizations, Proceedings of the ninth annual ACM Symposium on Theory of Computing, 1977, pp. 186-194.
[Sip78] M., Sipser, Halting space-bounded computations, Proceedings of the 19th annual IEEE symposium on Foundations of Computer Science, 1978, pp. 73-74.
[Sip82] M., Sipser, On relativization and the existence of complete sets, Automata, languages, and programming, Lecture Notes in Computer Science, vol. 140, Springer-Verlag, 1982.
[Sip83] M., Sipser, A complexity theoretic approach to randomness, Proceedings of the fifteenth ACM Symposium on Theory of Computing, 1983, pp. 330-335.
[SS77] R., Solovay and V., Strassen, A fast Monte-Carlo test for primality, SIAM Journal on Computing, vol. 6 (1977), pp. 84-85.Google Scholar
[Sto76] L., Stockmeyer, The polynomial-time hierarchy, Theoretical Computer Science, vol. 3 (1976), pp. 1-22.Google Scholar
[Sze88] R., Szelepcsényi, The method of forced enumeration for nondeterministic automata, Acta Informatica, vol. 26 (1988), pp. 279-284.Google Scholar
[Tod89] S., Toda, On the computational power of PP and ⊕P, Proceedings of the 30th IEEE symposium on Foundations of Computer Science, 1989, pp. 514-519.
[Tre04] L., Trevisan, Inapprox imability of combinatorial optimization problems, The Electronic Colloquium in Computational Complexity, (2004), pp. 1-39, Technical Report 65.
[Tur36] A. M., Turing, On computable numbers with an application to the Entscheidungsproblem, Proceedings of the London Mathematical Society, vol. 42 (1936), pp. 230-365.Google Scholar
[Tur39] A. M., Turing, Systems of logic based on ordinals, Proceedings of the London Mathematical Society, vol. 45 (1939), pp. 161-228.Google Scholar
[Tur50] A. M., Turing, Computing machinery and intelligence, Mind, vol. 49 (1950), pp. 433-460.Google Scholar
[Wra76] C., Wrathall, Complete sets and the polynomial hierarchy, Theoretical Computer Science, vol. 3 (1976), pp. 23-33.Google Scholar
[Yao82] A., Yao, Theory and applications of trapdoor functions, Proceedings of the 23rd IEEE symposium on Foundations of Computer Science, 1982, pp. 80-91.
[Yao85] A., YAO, Separating the polynomial-time hierarchy by oracles, Proceedings of the 26th IEEE symposium on Foundations of Computer Science, 1985, pp. 1-10.
[Zak83] S., Žák, A Turingmachine timehierarchy, Theoretical Computer Science, vol. 26 (1983), pp. 327-333.Google Scholar
[Zip79] R., Zippel, Probabilistic algorithms for sparse polynomials, Lecture Notes in Computer Science, vol. 72, Springer, 1979.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×